id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-6754
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the localFileStorage method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7407.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.3
null
GHSA-fg94-xg7j-w3vf
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: mvm: set the cipher for secured NDP rangingThe cipher pointer is not set, but is derefereced trying to set its content, which leads to a NULL pointer dereference. Fix it by pointing to the cipher parameter before dereferencing.
[]
null
5.5
null
null
GHSA-g7fp-8rpj-5fj2
On BIG-IP version 16.1.x before 16.1.2, when an HTTP profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
null
null
null
null
RHSA-2025:9179
Red Hat Security Advisory: libsoup security update
libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup libsoup: Denial of Service attack to websocket server libsoup: Out of bounds reads in soup_headers_parse_request() libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.4
null
null
CVE-2022-47192
Admin password reset via file upload vulnerability in Generex CS141
Generex UPS CS141 below 2.06 version, could allow a remote attacker to upload a backup file containing a modified "users.json" to the web server of the device, allowing him to replace the administrator password.
[ "cpe:2.3:o:generex:cs141_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:generex:cs141:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-14457
An issue was discovered in libgig 4.1.0. There is an out-of-bounds write in the function DLS::Info::UpdateChunks in DLS.cpp.
[ "cpe:2.3:a:linuxsampler:libgig:4.1.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-34r8-h3gq-qmjj
UCMS 1.5.0 was discovered to contain a physical path leakage via an error message returned by the adminchannelscache() function in top.php.
[]
null
5.3
null
null
GHSA-j762-55qq-xmr6
SQL injection vulnerability in admin_poll.asp in PollMentor 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to pollmentorres.asp.
[]
null
null
null
null
CVE-2007-1914
The RFC_START_PROGRAM function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to obtain sensitive information (external RFC server configuration data) via unspecified vectors, a different vulnerability than CVE-2006-6010. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended.
[ "cpe:2.3:a:sap:rfc_library:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:sap:rfc_library:7.0:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-63gw-hff3-vv3w
Microsoft Windows 10 Gold and 1511 allows attackers to cause a denial of service via unspecified vectors, aka "Windows Denial of Service Vulnerability."
[]
null
null
7.5
null
GHSA-jr6g-h572-57hf
Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Item Catalog). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[]
null
8.1
null
null
CVE-2020-2926
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.19 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
null
4.4
null
GHSA-f92g-3pmp-x3pm
Multiple stack-based buffer overflows in Firebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, allow remote attackers to execute arbitrary code via (1) a long attach request on TCP port 3050 to the isc_attach_database function or (2) a long create request on TCP port 3050 to the isc_create_database function.
[]
null
null
null
null
CVE-2024-13104
D-Link DIR-816 A2 WiFi Settings form2AdvanceSetup.cgi access control
A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
5.3
5
CVE-2025-32021
Weblate VCS credentials included in URL parameters are potentially logged and saved into browser history as plaintext
Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11.
[]
null
2.2
null
null
CVE-2011-1885
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
7.2
RHSA-2008:1025
Red Hat Security Advisory: java-1.5.0-sun security update
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
CVE-2018-5042
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2020-2026
Kata Containers - Guests can trick the kata-runtime into mounting the container image on any host path
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
[ "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-8329-73v4-x45c
The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system.
[]
null
null
null
null
GHSA-hm9w-m367-w8fp
Winamp Web Interface (Wawi) 7.5.13 and earlier uses an insufficient comparison to determine whether a directory is located below the application's root directory, which allows remote authenticated users to access certain other directories if the name of the root directory is a substring of the name of the target directory, as demonstrated by accessing C:\folder2 when the root directory is C:\folder.
[]
null
null
null
null
CVE-2018-10208
An issue was discovered in Vaultize Enterprise File Sharing 17.05.31. There is anonymous reflected XSS on the error page via a /share/error?message= URI.
[ "cpe:2.3:a:vaultize:enterprise_file_sharing:17.05.31:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2022-22652
The GSMA authentication panel could be presented on the lock screen. The issue was resolved by requiring device unlock to interact with the GSMA authentication panel. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access may be able to view and modify the carrier account information and settings from the lock screen.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
6.1
null
3.6
GHSA-3783-62vc-jr7x
ConsoleMe has an Arbitrary File Read Vulnerability via Limited Git command
ID: NFLX-2024-002ImpactAuthenticated users can achieve limited RCE in ConsoleMe, restricted to flag inputs on a single CLI command. Due to this constraint, it is not currently known whether full RCE is possible but it is unlikely. However, a specific flag allows authenticated users to read any server files accessible by the ConsoleMe process. Given ConsoleMe's role as an AWS identity broker, accessing files containing secrets on the server could potentially be exploited for privilege escalation.Deployments of ConsoleMe that allow templated resources are impacted and urged to patch immediately. Deployments that do not permit templated resources are not affected.To determine if your ConsoleMe deployment uses templated resources, check the configuration value for `cache_resource_templates.repositories`. If this value does not exist or is an empty array, your deployment is not impacted.DescriptionThe self-service flow for templated resources in ConsoleMe accepts a user-supplied JSON post body, which includes the filename for the templated resource. However, this user-supplied filename is not properly sanitized and is passed directly as a string to a CLI command. This allows users to input flags instead of filenames. By passing a specific flag with a filename value, users can induce an error that reveals the contents of the specified file, allowing them to read any files readable by the system user executing the ConsoleMe server process.PatchesThis issue has been patched in version [v1.4.0](https://pypi.org/project/consoleme/1.4.0/) via https://github.com/Netflix/consoleme/pull/9380. If you are unable to upgrade to the latest version, users can selectively apply the code changes in the above PR. Alternatively, removing the configuration item `cache_resource_templates.repositories` or adding it as an empty array should mitigate the issue, but will result in broken functionality (templated resources will no longer be supported for self-service).Credit[Jay Dhulia](https://github.com/jaydhulia)
[]
null
9.6
null
null
GHSA-gm89-j9wr-p8rw
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16367.
[]
null
7.8
null
null
GHSA-mq99-924g-fq3x
A cross-site scripting (XSS) vulnerability in RageFrame2 v2.6.43, allows remote attackers to execute arbitrary web scripts or HTML and obtain sensitive information via a crafted payload injected into the upload_drive parameter.
[]
null
6.1
null
null
CVE-2010-4898
SQL injection vulnerability in the Gantry (com_gantry) component 3.0.10 for Joomla! allows remote attackers to execute arbitrary SQL commands via the moduleid parameter to index.php.
[ "cpe:2.3:a:gantry-framework:com_gantry:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-2604
Unspecified vulnerability in HP IceWall SSO 10.0 Dfw and IceWall MCRP 2.1 and 3.0 allows remote attackers to cause a denial of service via unknown vectors.
[ "cpe:2.3:a:hp:icewall_mcrp:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:dfw:*:*:*" ]
null
null
null
5
CVE-2019-10542
Buffer over-read may occur when downloading a corrupted firmware file that has chunk length in header which doesn`t match the contents in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SDX20
[ "cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-7q82-fxvh-gf2x
Multiple parameters have SQL injection vulnerability in JEPaaS 7.2.8 via /je/login/btnLog/insertBtnLog, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB.
[]
null
9.1
null
null
GHSA-4c9r-fcrv-f86f
Vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, The file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges.
[]
null
9.8
null
null
CVE-2016-1941
The file-download dialog in Mozilla Firefox before 44.0 on OS X enables a certain button too quickly, which allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2023-47257
ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.
[ "cpe:2.3:a:connectwise:automate:-:*:*:*:*:*:*:*", "cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2024-21214
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-438x-56gx-w64g
CgiUserConfigEdit in BackupPC 3.1.0, when SSH keys and Rsync are in use in a multi-user environment, does not restrict users from the ClientNameAlias function, which allows remote authenticated users to read and write sensitive files by modifying ClientNameAlias to match another system, then initiating a backup or restore.
[]
null
null
null
null
RHSA-2024:5622
Red Hat Security Advisory: fence-agents security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::highavailability" ]
null
4.4
null
null
GHSA-rhv8-wfm8-gjqj
In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.
[]
null
9.8
null
null
GHSA-4pvw-p74p-pc99
IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges for file deletion by manipulating the Clean & Optimize feature with an NTFS junction and an Object Manager symbolic link.
[]
null
null
null
null
CVE-2009-4298
The LAMS module (mod/lams) for Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 stores the (1) username, (2) firstname, and (3) lastname fields within the user table, which allows attackers to obtain user account information via unknown vectors.
[ "cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-4209
Cisco WebEx Meeting Center does not properly determine authorization for reading a host calendar, which allows remote attackers to obtain sensitive information by obtaining a list of all meetings and then sending a calendar request for each one, aka Bug ID CSCur23913.
[ "cpe:2.3:a:cisco:webex_meeting_center:-:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-2h65-jhhf-3h5q
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.36 and 5.0.14 allows remote attackers to affect availability via unknown vectors related to Core.
[]
null
null
null
null
GHSA-4hhj-q24f-3rg6
PHP remote file inclusion vulnerability in index.php in Ivan Gallery Script 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the gallery parameter in a new session.
[]
null
null
null
null
CVE-2018-9572
In impd_drc_parse_coeff of impd_drc_static_payload.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116224432.
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
CVE-2010-4036
Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.454.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.455.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.456.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.457.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.458.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.458.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.458.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.459.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.460.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.461.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.462.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.464.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.465.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.465.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.466.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.467.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.469.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.470.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.471.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.472.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.473.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.474.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.475.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.476.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.477.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.478.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.479.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.480.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.481.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.482.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.483.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.484.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.485.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.486.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.487.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.488.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.489.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.490.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.490.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.491.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.492.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.493.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.494.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.495.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.495.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:6.0.496.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.497.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.498.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.499.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.499.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.500.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.500.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.503.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.503.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.504.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.505.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.506.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.507.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.507.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.507.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.507.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.509.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.510.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.511.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.511.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.511.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.512.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.513.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.514.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.514.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.515.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.516.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:7.0.517.39:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-g295-36ch-j742
The Digits plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.1. This is due to missing nonce validation in the 'digits_save_settings' function. This makes it possible for unauthenticated attackers to modify the default role of registered users to elevate user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
8.8
null
null
CVE-2017-3282
Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data. CVSS v3.0 Base Score 4.7 (Integrity impacts).
[ "cpe:2.3:a:oracle:partner_management:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.6:*:*:*:*:*:*:*" ]
null
null
4.7
4.3
GHSA-cqvw-46pg-24r3
Multiple cross-site scripting (XSS) vulnerabilities in F5 FirePass SSL VPN allow remote attackers to inject arbitrary web script or HTML via (1) the xcho parameter to my.logon.php3; the (2) topblue, (3) midblue, (4) wtopblue, and certain other Custom color parameters in a per action to vdesk/admincon/index.php; the (5) h321, (6) h311, (7) h312, and certain other Front Door custom text color parameters in a per action to vdesk/admincon/index.php; the (8) ua parameter in a bro action to vdesk/admincon/index.php; the (9) app_param and (10) app_name parameters to webyfiers.php; (11) double eval functions; (12) JavaScript contained in an <FP_DO_NOT_TOUCH> element; and (13) the vhost parameter to my.activation.php. NOTE: it is possible that this candidate overlaps CVE-2006-3550.
[]
null
null
null
null
GHSA-9pj9-8qr7-5x38
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
[]
null
8.6
null
null
RHSA-2004:632
Red Hat Security Advisory: samba security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
GHSA-m9mx-49mx-whcc
A CWE-476: NULL Pointer Dereference vulnerability exists that could cause a denial of service of the webserver when parsing JSON content type. Affected Products: X80 advanced RTU Communication Module (BMENOR2200H) (V2.01 and later), OPC UA Modicon Communication Module (BMENUA0100) (V1.10 and prior)
[]
null
7.5
null
null
CVE-2021-34500
Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4946:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20269:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21372:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21372:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25860:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23605:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20269:*:*:*:*:*:x64:*" ]
null
6.3
null
null
GHSA-5gjw-xf38-367f
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. This issue affects the function msp_info_htm of the file msp_info.htm. The manipulation of the argument cmd leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273521 was assigned to this vulnerability.
[]
5.3
6.3
null
null
CVE-2019-17057
Footy Tipping Software AFL Web Edition 2019 allows XSS.
[ "cpe:2.3:a:footy:tipping_software:2019:*:*:*:web_edition:*:*:*" ]
null
6.1
null
4.3
GHSA-mx2h-hf7j-2x3p
Improper Neutralization of Input During Web Page Generation in Apache Solr
Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, related to webapp/web/js/scripts/schema-browser.js.
[]
null
null
6.1
null
GHSA-34fq-349c-fpv2
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted file may lead to arbitrary code execution.
[]
null
7.8
null
null
GHSA-44x3-96q8-6c96
Microsoft GDI Component in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to log on to an affected system and run a specially crafted application to compromise the user's system, due improperly disclosing kernel memory addresses, aka "Windows GDI Information Disclosure Vulnerability".
[]
null
null
4.7
null
CVE-2024-22032
Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec
A vulnerability has been identified in which an RKE1 cluster keeps constantly reconciling when secrets encryption configuration is enabled. When reconciling, the Kube API secret values are written in plaintext on the AppliedSpec. Cluster owners, Cluster members, and Project members (for projects within the cluster), all have RBAC permissions to view the cluster object from the apiserver.
[]
7.1
6.5
null
null
CVE-2022-4095
A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-mwfg-6wv9-379f
Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection.
[]
null
7.5
null
null
CVE-2021-43046
TIBCO PartnerExpress Session Token in URL
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.
[ "cpe:2.3:a:tibco:partnerexpress:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2021:0320
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 8
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
5.8
null
null
RHSA-2013:0762
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice
This is the 1-Year notification for the retirement of Red Hat Enterprise MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5.
[ "cpe:/a:redhat:enterprise_mrg:1::el5", "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
CVE-2019-16508
The Imagination Technologies driver for Chrome OS before R74-11895.B, R75 before R75-12105.B, and R76 before R76-12208.0.0 allows attackers to trigger an Integer Overflow and gain privileges via a malicious application. This occurs because of intentional access for the GPU process to /dev/dri/card1 and the PowerVR ioctl handler, as demonstrated by PVRSRVBridgeSyncPrimOpCreate.
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
CVE-2019-11842
An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random number generation is mishandled, which makes it easier for attackers to predict a Sydent authentication token or a Synapse random ID.
[ "cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*", "cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-2x9w-m9r8-rmvq
LiveZilla 5.0.1.4 has a Remote Code Execution vulnerability
[]
null
null
null
null
CVE-2020-9961
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2008-7102
DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.
[ "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-37470
Metabase vulnerable to remote code execution via POST /api/setup/validate API endpoint
Metabase is an open-source business intelligence and analytics platform. Prior to versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4, a vulnerability could potentially allow remote code execution on one's Metabase server. The core issue is that one of the supported data warehouses (an embedded in-memory database H2), exposes a number of ways for a connection string to include code that is then executed by the process running the embedded database. Because Metabase allows users to connect to databases, this means that a user supplied string can be used to inject executable code. Metabase allows users to validate their connection string before adding a database (including on setup), and this validation API was the primary vector used as it can be called without validation. Versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4 fix this issue by removing the ability of users to add H2 databases entirely. As a workaround, it is possible to block these vulnerabilities at the network level by blocking the endpoints `POST /api/database`, `PUT /api/database/:id`, and `POST /api/setup/validateuntil`. Those who use H2 as a file-based database should migrate to SQLite.
[ "cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*" ]
null
10
null
null
CVE-2024-9913
D-Link DIR-619L B1 formSetRoute buffer overflow
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formSetRoute of the file /goform/formSetRoute. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2012-0557
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0555, and CVE-2012-0556.
[ "cpe:2.3:a:oracle:fusion_middleware:8.3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6mmq-wfvf-jxf6
A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
[]
null
10
null
null
GHSA-vmqr-c49v-3hhp
The getItemInfoByAtom function in the ActiveX control for Microsoft Windows Media Player 9.0 returns a 0 if the file does not exist and the size of the file if the file exists, which allows remote attackers to determine the existence of files on the local system.
[]
null
null
null
null
GHSA-pq95-gj94-4r5p
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, and 8.1 software. Certain security settings, related to whether packages are verified and accepted only from known sources, are mishandled. The LG ID is LVE-SMP-190002 (April 2019).
[]
null
null
null
null
CVE-2019-12902
Pydio Cells before 1.5.0 does incomplete cleanup of a user's data upon deletion. This allows a new user, holding the same User ID as a deleted user, to restore the deleted user's data.
[ "cpe:2.3:a:pydio:cells:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-46mw-pp5w-gff7
An unauthenticated attacker can get users' emails by knowing usernames. A password reset email will be sent in response to this unsolicited request.
[]
6.9
5.3
null
null
RHSA-2022:4587
Red Hat Security Advisory: pcs security update
sinatra: path traversal possible outside of public_dir when serving static files
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
7.5
null
null
GHSA-r6rv-m68g-fvjq
An issue was discovered in WTCMS 1.0. It allows remote attackers to cause a denial of service (resource consumption) via crafted dimensions for the verification code image.
[]
null
null
7.5
null
ICSA-21-131-07
Siemens SIMATIC NET CP343-1
Specially crafted packets sent to TCP port 102 could cause a Denial-of-Service condition on the affected devices. A cold restart might be necessary in order to recover.
[]
null
7.5
null
null
GHSA-w2vp-cxx6-662p
Cybonet - CWE-22: Improper Limitation of a Pathname to a Restricted Directory
[]
null
7.5
null
null
GHSA-6648-296f-7jc7
A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Account/login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254624.
[]
null
7.3
null
null
CVE-2019-2993
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: C API). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
5.3
null
3.5
CVE-2017-20015
WEKA INTEREST Security Scanner LAN Viewer denial of service
A vulnerability, which was classified as problematic, was found in WEKA INTEREST Security Scanner up to 1.8. This affects an unknown part of the component LAN Viewer. The manipulation with an unknown input leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:weka:interest_security_scanner:*:*:*:*:*:*:*:*" ]
null
2.8
null
null
RHSA-2023:5048
Red Hat Security Advisory: flac security update
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
GHSA-wgxc-hmmq-r3v4
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567.
[]
null
null
null
null
CVE-1999-0155
The ghostscript command with the -dSAFER option allows remote attackers to execute commands.
[ "cpe:2.3:a:aladdin_enterprises:ghostscript:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:aladdin_enterprises:ghostscript:3.22:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-488v-m6fm-php4
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Accordion widget in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes like 'accordion_title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2023-25174
Improper access control in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2018-13750
The mintToken function of a smart contract implementation for RichiumToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:richiumtoken_project:richiumtoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2014:0520
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk kernel: pty layer race condition leading to memory corruption kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
GHSA-25pp-pjqx-3f66
In the Linux kernel, the following vulnerability has been resolved:net_sched: sch_sfq: don't allow 1 packet limitThe current implementation does not work correctly with a limit ofiproute2 actually checks for this and this patch adds the check in kernel as well.This fixes the following syzkaller reported crash:UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026 tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319 qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026 dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296 netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline] dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362 __dev_close_many+0x214/0x350 net/core/dev.c:1468 dev_close_many+0x207/0x510 net/core/dev.c:1506 unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738 unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695 unregister_netdevice include/linux/netdevice.h:2893 [inline] __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689 tun_detach drivers/net/tun.c:705 [inline] tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640 __fput+0x203/0x840 fs/file_table.c:280 task_work_run+0x129/0x1b0 kernel/task_work.c:185 exit_task_work include/linux/task_work.h:33 [inline] do_exit+0x5ce/0x2200 kernel/exit.c:931 do_group_exit+0x144/0x310 kernel/exit.c:1046 __do_sys_exit_group kernel/exit.c:1057 [inline] __se_sys_exit_group kernel/exit.c:1055 [inline] __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055 do_syscall_64+0x6c/0xd0 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fe5e7b52479 Code: Unable to access opcode bytes at RIP 0x7fe5e7b5244f. RSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0 R13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270The crash can be also be reproduced with the following (with a tc recompiled to allow for sfq limits of 1):tc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s ../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1 ifconfig dummy0 up ping -I dummy0 -f -c2 -W0.1 8.8.8.8 sleep 1Scenario that triggers the crash:the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1TBF dequeues: it peeks from SFQ which moves the packet to the gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so it schedules itself for later.the second packet is sent and TBF tries to queues it to SFQ. qdisc qlen is now 2 and because the SFQ limit is 1 the packet is dropped by SFQ. At this point qlen is 1, and all of the SFQ slots are empty, however q->tail is not NULL.At this point, assuming no more packets are queued, when sch_dequeue runs again it will decrement the qlen for the current empty slot causing an underflow and the subsequent out of bounds access.
[]
null
5.5
null
null
GHSA-h967-6jx6-2r3h
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability.
[]
null
7.5
null
null
GHSA-mghp-6344-hxqp
NetApp SnapCenter Server versions 1.1 through 2.x are susceptible to a Cross-Site Request Forgery (CSRF) vulnerability which could be used to cause an unintended authenticated action in the user interface.
[]
null
null
8.8
null
GHSA-cgcp-gvp8-4fpv
The Contact Form 7 Email Add on plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the cf7_email_add_on_add_admin_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php files can be uploaded and included.
[]
null
8.8
null
null
CVE-2022-49928
SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 0000000000000030 by task gssproxy/457 CPU: 5 PID: 457 Comm: gssproxy Not tainted 6.0.0-09040-g02357b27ee03 #9 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 kasan_report+0xa3/0x120 sysfs_do_create_link_sd+0x40/0xd0 rpc_sysfs_client_setup+0x161/0x1b0 rpc_new_client+0x3fc/0x6e0 rpc_create_xprt+0x71/0x220 rpc_create+0x1d4/0x350 gssp_rpc_create+0xc3/0x160 set_gssp_clnt+0xbc/0x140 write_gssp+0x116/0x1a0 proc_reg_write+0xd6/0x130 vfs_write+0x177/0x690 ksys_write+0xb9/0x150 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 When the xprt_switch sysfs alloc failed, should not add xprt and switch sysfs to it, otherwise, maybe null-ptr-deref; also initialize the 'xps_sysfs' to NULL to avoid oops when destroy it.
[]
null
5.5
null
null
CVE-2006-7149
Multiple cross-site scripting (XSS) vulnerabilities in Mambo 4.6.x allow remote attackers to inject arbitrary web script or HTML via (1) the query string to (a) index.php, which reflects the string in an error message from mod_login.php; and the (2) mcname parameter to (b) moscomment.php and (c) com_comment.php.
[ "cpe:2.3:a:mambo:mambo:4.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:4.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2014-4014
The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
6.2
CVE-2020-3645
Firmware will hit assert in WLAN firmware If encrypted data length in FILS IE of reassoc response is more than 528 bytes in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, IPQ8074, Kamorta, Nicobar, QCA6390, QCA8081, QCN7605, QCS404, QCS405, QCS605, Rennell, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130, SXR2130
[ "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-2gj7-v6cw-hpq6
Cross-site scripting (XSS) vulnerability in frontend/x/htaccess/changepro.html in cPanel 10.9.1 allows remote attackers to inject arbitrary web script or HTML via the resname parameter.
[]
null
null
null
null
CVE-2024-45993
Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb.
[ "cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2021-46973
net: qrtr: Avoid potential use after free in MHI send
In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.4
null
null