id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2007-0228 | The DataCollector service in EIQ Networks Network Security Analyzer allows remote attackers to cause a denial of service (service crash) via a (1) &CONNECTSERVER& (2) &ADDENTRY& (3) &FIN& (4) &START& (5) &LOGPATH& (6) &FWADELTA& (7) &FWALOG& (8) &SETSYNCHRONOUS& (9) &SETPRGFILE&, or (10) &SETREPLYPORT& string to TCP port 10618, which triggers a NULL pointer dereference. | [
"cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:2.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-2mc3-3j9x-hm83 | In very rare cases, a PHP type juggling vulnerability in centreonAuth.class.php in Centreon Web before 2.8.27 allows attackers to bypass authentication mechanisms in place. | []
| null | 7.5 | null | null |
|
CVE-2014-3071 | Cross-site scripting (XSS) vulnerability in the Data Quality Console in IBM InfoSphere Information Server 11.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL for adding a project connection. | [
"cpe:2.3:a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2022-20277 | In DevicePolicyManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-205145497 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2006-6271 | Multiple cross-site scripting (XSS) vulnerabilities in PHPOLL 0.96 allow remote attackers to inject arbitrary web script or HTML via the language parameter to (1) index.php, (2) info.php; and (3) index.php, (4) votanti.php, (5) risultati_config.php, (6) modifica_band.php, (7) band_editor.php, and (8) config_editor.php in admin/. | [
"cpe:2.3:a:phpoll:phpoll:0.96:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2018-4414 | A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
GHSA-249f-3j5h-crgv | In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932916; Issue ID: MSV-1550. | []
| null | 7.8 | null | null |
|
GHSA-gmpc-hjpx-q93p | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000c998." | []
| null | null | 7.8 | null |
|
CVE-2019-16931 | A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization. | [
"cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
|
PYSEC-2023-301 | null | Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | []
| null | 7.8 | null | null |
GHSA-p92m-g69f-qc82 | Directory traversal vulnerability in index.php in Pecio CMS 1.1.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the language parameter. | []
| null | null | null | null |
|
GHSA-4f32-8hqj-hvcg | In the Linux kernel, the following vulnerability has been resolved:usb: atm: cxacru: fix endpoint checking in cxacru_bind()Syzbot is still reporting quite an old issue [1] that occurs due to
incomplete checking of present usb endpoints. As such, wrong
endpoints types may be used at urb sumbitting stage which in turn
triggers a warning in usb_submit_urb().Fix the issue by verifying that required endpoint types are present
for both in and out endpoints, taking into account cmd endpoint type.Unfortunately, this patch has not been tested on real hardware.[1] Syzbot report:
usb 1-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
...
Call Trace:
cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649
cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760
cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209
usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055
cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363
usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396
call_driver_probe drivers/base/dd.c:517 [inline]
really_probe+0x23c/0xcd0 drivers/base/dd.c:595
__driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747
driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777
__device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894
bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427
__device_attach+0x228/0x4a0 drivers/base/dd.c:965
bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487
device_add+0xc2f/0x2180 drivers/base/core.c:3354
usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170
usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238
usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293 | []
| null | 5.5 | null | null |
|
CVE-2014-3843 | Cross-site request forgery (CSRF) vulnerability in the Search Everything plugin before 8.1.1 for WordPress allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:zemanta:search_everything:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:zemanta:search_everything:7.0.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:zemanta:search_everything:7.0.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:zemanta:search_everything:7.0.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:zemanta:search_everything:8.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2023-5642 | Advantech R-SeeNet Unauthenticated Read/Write | Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. | [
"cpe:2.3:a:advantech:r-seenet:2.4.23:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-jjm5-5v9v-7hx2 | org.xwiki.platform:xwiki-platform-security-authentication-default XSS with authenticate endpoints | ImpactIt was possible to inject some code using the URL of authenticate endpoints, e.g.:This vulnerability was present in recent versions of XWiki:13.10.8+14.4.3+14.6+PatchesThis problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThere is no easy workaround except to upgrade.Referenceshttps://jira.xwiki.org/browse/XWIKI-20335https://github.com/xwiki/xwiki-platform/commit/1943ea26c967ef868fb5f67c487d98d97cba0380For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira](https://jira.xwiki.org)Email us at [security mailing-list](mailto:[email protected]) | []
| null | 5.4 | null | null |
CVE-2018-4152 | An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "Notes" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 7.6 |
|
CVE-2022-42147 | kkFileView 4.0 is vulnerable to Cross Site Scripting (XSS) via controller\ Filecontroller.java. | [
"cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-37jx-v87h-x8gc | Pidgin 2.10.0 uses DBUS for certain cleartext communication, which allows local users to obtain sensitive information via a dbus session monitor. | []
| null | 5.5 | null | null |
|
GHSA-7p3v-c73x-wr24 | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a world-readable axess/opt/axXMPPHandler/config/xmpp_config.py file that stores hardcoded credentials. | []
| null | 9.8 | null | null |
|
CVE-2022-38680 | In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2021-22341 | There is a memory leak vulnerability in Huawei products. A resource management weakness exists in a module. Attackers with high privilege can exploit this vulnerability by performing some operations. This can lead to memory leak. Affected product versions include:IPS Module V500R005C00SPC100,V500R005C00SPC200;NGFW Module V500R005C00SPC100,V500R005C00SPC200;NIP6300 V500R005C00SPC100,V500R005C10SPC200;NIP6600 V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 V500R005C00SPC100,V500R005C10SPC200;Secospace USG6600 V500R005C00SPC100,V500R005C00SPC200. | [
"cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6300_firmware:v500r005c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*"
]
| null | 4.9 | null | 4 |
|
GHSA-q68r-x3xx-f2m3 | 51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | []
| null | 6.5 | null | null |
|
CVE-2020-25214 | In the client in Overwolf 0.149.2.30, a channel can be accessed or influenced by an actor that is not an endpoint. | [
"cpe:2.3:a:overwolf:overwolf:0.149.2.30:*:*:*:*:*:*:*"
]
| null | 8.1 | null | 9.3 |
|
GHSA-v3c9-w6g2-hjg3 | Cross-Site Request Forgery in XXL-Job | A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add. | []
| null | 8.8 | null | null |
GHSA-r887-hfp4-4397 | The SuiteLink Service (aka slssvc.exe) in WonderWare SuiteLink before 2.0 Patch 01, as used in WonderWare InTouch 8.0, allows remote attackers to cause a denial of service (NULL pointer dereference and service shutdown) and possibly execute arbitrary code via a large length value in a Registration packet to TCP port 5413, which causes a memory allocation failure. | []
| null | null | null | null |
|
CVE-2021-24773 | WordPress Download Manager < 3.2.16 - Admin+ Stored Cross-Site Scripting | The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed | [
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*"
]
| null | 4.8 | null | 3.5 |
GHSA-xqwx-r7c6-p379 | SQL injection vulnerability in graph.php in Cacti before 0.8.6f allows remote authenticated users to execute arbitrary SQL commands via the local_graph_id parameter, a different vulnerability than CVE-2007-6035. | []
| null | null | null | null |
|
GHSA-rcfc-xq5g-7phm | Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. | []
| null | null | 7.5 | null |
|
CVE-2017-0418 | An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32703959. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-qj8c-ppfc-qr5f | There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission. | []
| null | 7.1 | null | null |
|
CVE-2025-37908 | mm, slab: clean up slab->obj_exts always | In the Linux kernel, the following vulnerability has been resolved:
mm, slab: clean up slab->obj_exts always
When memory allocation profiling is disabled at runtime or due to an
error, shutdown_mem_profiling() is called: slab->obj_exts which
previously allocated remains.
It won't be cleared by unaccount_slab() because of
mem_alloc_profiling_enabled() not true. It's incorrect, slab->obj_exts
should always be cleaned up in unaccount_slab() to avoid following error:
[...]BUG: Bad page state in process...
..
[...]page dumped because: page still charged to cgroup
[[email protected]: fold need_slab_obj_ext() into its only user] | []
| null | null | null | null |
GHSA-6x75-c972-w59f | In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account. | []
| null | 9.1 | null | null |
|
GHSA-v3hq-hr77-g53p | In all Qualcomm products with Android releases from CAF using the Linux kernel, access control to the I2C bus is not sufficient. | []
| null | null | 9.8 | null |
|
GHSA-r59c-8gpj-2fqr | An issue in the wssrvc.exe service of QuickHeal Antivirus Pro Version v24.0 and Quick Heal Total Security v24.0 allows authenticated attackers to escalate privileges. | []
| null | 8.8 | null | null |
|
GHSA-r365-c863-wwvq | An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Cleartext Storage of Sensitive Information. | []
| null | null | 9.8 | null |
|
CVE-2022-30401 | Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/?p=view_product&id=. | [
"cpe:2.3:a:merchandise_online_store_project:merchandise_online_store:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
CVE-2025-47619 | WordPress 6Storage Rentals <= 2.19.4 - Broken Access Control Vulnerability | Missing Authorization vulnerability in 6Storage 6Storage Rentals allows Path Traversal. This issue affects 6Storage Rentals: from n/a through 2.19.4. | []
| null | 6.5 | null | null |
GHSA-2929-g6q5-v2mw | The Campus Link - Campus TV HKUSU (aka com.campus.tv.hkusu) application 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-w28c-cgxf-w8gv | DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response | []
| null | 5.9 | null | null |
|
CVE-2020-6767 | Path Traversal in Bosch Video Management System (BVMS) | A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed. | [
"cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*"
]
| null | 7.7 | null | null |
CVE-2021-47423 | drm/nouveau/debugfs: fix file release memory leak | In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau/debugfs: fix file release memory leak
When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2014-9901 | The Qualcomm Wi-Fi driver in Android before 2016-08-05 on Nexus 7 (2013) devices makes incorrect snprintf calls, which allows remote attackers to cause a denial of service (device hang or reboot) via crafted frames, aka Android internal bug 28670333 and Qualcomm internal bug CR548711. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
CVE-2022-29847 | In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host. | [
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-944q-gmcx-pp5j | Cross-site scripting (XSS) vulnerability in frmCompose.aspx in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote attackers to inject arbitrary web script or HTML via Javascript to the "check spelling" feature in the compose area. | []
| null | null | null | null |
|
GHSA-xf5c-p855-rpw9 | The tbm-client from Chunghwa Telecom has an Arbitrary File vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability. Attackers can copy arbitrary files on the user's system and paste them into any path, which poses a potential risk of information leakage or could consume hard drive space by copying files in large volumes. | []
| null | 7.1 | null | null |
|
GHSA-5qf9-xcjw-v37w | IBM GPFS (IBM Spectrum Scale 5.0.1.0 and 5.0.1.1) allows a local, unprivileged user to cause a kernel panic on a node running GPFS by accessing a file that is stored on a GPFS file system with mmap, or by executing a crafted file stored on a GPFS file system. IBM X-Force ID: 148805. | []
| null | null | 6.5 | null |
|
CVE-2021-33672 | Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability. | [
"cpe:2.3:a:sap:contact_center:700:*:*:*:*:*:*:*"
]
| null | null | 9.6 | null |
|
GHSA-hpwr-8p93-377c | Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi. | []
| null | null | null | null |
|
GHSA-r4r6-77v3-8vgh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound UTM tags tracking for Contact Form 7 allows Reflected XSS. This issue affects UTM tags tracking for Contact Form 7: from n/a through 2.1. | []
| null | 7.1 | null | null |
|
GHSA-rx52-5cxg-mw2w | An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a heap-based buffer overflow problem in the function ReadNextCell() in mat5.c. | []
| null | null | 7.5 | null |
|
GHSA-hp72-9f76-93p7 | The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | []
| null | null | null | null |
|
CVE-2020-25609 | The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2025-0806 | code-projects Job Recruitment _call_job_search_ajax.php cross site scripting | A vulnerability was found in code-projects Job Recruitment 1.0. It has been rated as problematic. This issue affects some unknown processing of the file _call_job_search_ajax.php. The manipulation of the argument job_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 4.3 | 4.3 | 5 |
CVE-2020-11501 | GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol. | [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
]
| null | 7.4 | null | 5.8 |
|
RHSA-2022:0771 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
]
| null | 7 | null | null |
CVE-2025-48905 | Wasm exception capture vulnerability in the arkweb v8 module
Impact: Successful exploitation of this vulnerability may cause the failure to capture specific Wasm exception types. | []
| null | 8.1 | null | null |
|
GHSA-rfqp-v6qm-4pcq | Unspecified vulnerability in bitcoind and Bitcoin-Qt allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-4683. | []
| null | null | null | null |
|
GHSA-fpp2-mrhr-rqqg | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | []
| null | null | null | null |
|
CVE-2021-38116 | Possible Command injection Vulnerability in OpenText iManager | Possible Elevation of Privilege Vulnerability
in iManager has been discovered in
OpenText™ iManager. This impacts all versions before 3.2.5 | [
"cpe:2.3:a:opentext:imanager:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-pvw2-j6v9-6pwg | The Forms for Mailchimp by Optin Cat – Grow Your MailChimp List plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
|
CVE-2024-38757 | WordPress Typebot plugin <= 3.6.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Typebot allows Stored XSS.This issue affects Typebot: from n/a through 3.6.0. | []
| null | 6.5 | null | null |
RHSA-2019:0349 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for February 2019 | dotnet: Domain-spoofing attack in System.Uri | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
]
| null | null | 7.5 | null |
RHSA-2024:3970 | Red Hat Security Advisory: flatpak security update | flatpak: sandbox escape via RequestBackground portal | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
]
| null | 8.4 | null | null |
CVE-2021-29696 | IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. | [
"cpe:2.3:a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:*"
]
| null | null | 8 | null |
|
CVE-2003-0742 | SCO Internet Manager (mana) allows local users to execute arbitrary programs by setting the REMOTE_ADDR environment variable to cause menu.mana to run as if it were called from ncsa_httpd, then modifying the PATH environment variable to point to a malicious "hostname" program. | [
"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2018-0185 | Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands into the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell of an affected device and execute commands with root privileges on the device. The vulnerabilities exist because the affected software does not sufficiently sanitize command arguments before passing commands to the Linux shell for execution. An attacker could exploit these vulnerabilities by submitting a malicious CLI command to the affected software. A successful exploit could allow the attacker to break from the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell on an affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCuz03145, CSCuz56419, CSCva31971, CSCvb09542. | [
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 7.2 |
|
GHSA-7wh6-6h78-phxw | The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins. | []
| null | 5.3 | null | null |
|
GHSA-x5r5-2qrx-rqj8 | Transparent TLS may not be applied to Marbles with certain manifest configurations | Transparent TLS (TTLS) is a MarbleRun feature that wraps plain TCP connections between Marbles in TLS.
In the manifest, a user defines the connections that should be considered.ImpactIf a Marble is configured for TTLS, but doesn't have an environment variable defined in its parameters, TTLS is not applied.
The traffic will not be encrypted.MarbleRun deployments that don't use TTLS (which is only available with EGo Marbles) are not affected.PatchesThe issue has been patched in [`v1.4.1`](https://github.com/edgelesssys/marblerun/releases/tag/v1.4.1).WorkaroundsMake sure that all Marbles that use TTLS have an environment variable defined in their parameters.ReferencesFor a description of TTLS, see <https://docs.edgeless.systems/marblerun/features/transparent-TLS>
See the updated section on TTLS configuration in the manifest: <https://docs.edgeless.systems/marblerun/workflows/define-manifest#tls> | []
| null | 9.1 | null | null |
GHSA-hf6f-jq25-8gq9 | Gitea Remote Code Execution (RCE) | Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron. | []
| null | null | 9.8 | null |
GHSA-36x5-f2vx-p4jf | Multiple cross-site scripting (XSS) vulnerabilities in Test/WorkArea/workarea.aspx in Ektron Content Management System (CMS) before 9.10 SP1 (Build 9.1.0.184.1.114) allow remote authenticated users to inject arbitrary web script or HTML via the (1) page, (2) action, (3) folder_id, or (4) LangType parameter. | []
| null | null | null | null |
|
CVE-2015-9410 | The Blubrry PowerPress Podcasting plugin 6.0.4 for WordPress has XSS via the tab parameter. | [
"cpe:2.3:a:blubrry:powerpress:6.0.4:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-g67v-2hj4-m27f | SQL injection vulnerability in Brightcode Weblinks (com_brightweblinks) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter. | []
| null | null | null | null |
|
CVE-2014-9254 | bb_func_unsub.php in MiniBB 3.1 before 20141127 uses an incorrect regular expression, which allows remote attackers to conduct SQl injection attacks via the code parameter in an unsubscribe action to index.php. | [
"cpe:2.3:a:minibb:minibb:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-19704 | A stored cross-site scripting (XSS) vulnerability via ResourceController.java in spring-boot-admin as of 20190710 allows attackers to execute arbitrary web scripts or HTML. | [
"cpe:2.3:a:spring-boot-admin_project:spring-boot-admin:20190710:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2016-5557 | Unspecified vulnerability in the Oracle Advanced Pricing component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote attackers to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:oracle:advanced_pricing:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_pricing:12.2.6:*:*:*:*:*:*:*"
]
| null | null | 8.2 | 5.8 |
|
GHSA-wpmc-4q7p-9659 | .sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain privileges by appending commands to the file. | []
| null | null | null | null |
|
CVE-2009-3106 | The Servlet Engine/Web Container component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.37 does not properly implement security constraints on the (1) doGet and (2) doTrace methods, which allows remote attackers to bypass intended access restrictions and obtain sensitive information via a crafted HTTP HEAD request to a Web Application. | [
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.35:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2020-29384 | An issue was discovered in PNGOUT 2020-01-15. When compressing a crafted PNG file, it encounters an integer overflow. | [
"cpe:2.3:a:advsys:pngout:2020-01-15:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-7mqg-jxr5-f9f4 | Multiple SQL injection vulnerabilities in Exponent CMS before 2.2.0 release candidate 1 allow remote attackers to execute arbitrary SQL commands via the (1) src or (2) username parameter to index.php. | []
| null | null | null | null |
|
GHSA-h2v7-3fqq-7ff5 | IBM Sterling Secure Proxy 6.0.3 and 6.1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 269683. | []
| null | 4.3 | null | null |
|
GHSA-cj58-pmp3-24h8 | An issue was discovered in Mattermost Server before 1.2.0. It allows attackers to cause a denial of service (memory consumption) via a small compressed file that has a large size when uncompressed. | []
| null | null | null | null |
|
CVE-2017-12213 | A vulnerability in the dynamic access control list (ACL) feature of Cisco IOS XE Software running on Cisco Catalyst 4000 Series Switches could allow an unauthenticated, adjacent attacker to cause dynamic ACL assignment to fail and the port to fail open. This could allow the attacker to pass traffic to the default VLAN of the affected port. The vulnerability is due to an uncaught error condition that may occur during the reassignment of the auth-default-ACL dynamic ACL to a switch port after 802.1x authentication fails. A successful exploit of this issue could allow a physically adjacent attacker to bypass 802.1x authentication and cause the affected port to fail open, allowing the attacker to pass traffic to the default VLAN of the affected switch port. Cisco Bug IDs: CSCvc72751. | [
"cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_4000:-:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 3.3 |
|
GHSA-4c29-gfrp-g6x9 | CefSharp affected by libvpx's heap buffer overflow in vp8 encoding | Google is aware that an exploit for CVE-2023-5217 exists in the wild.Description
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)Referenceshttps://www.cve.org/CVERecord?id=CVE-2023-5217https://nvd.nist.gov/vuln/detail/CVE-2023-5217 | []
| null | null | null | null |
GHSA-4f3f-qmwc-952f | Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally. | []
| null | 7.8 | null | null |
|
GHSA-h5xf-hvr4-x25g | Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers. | []
| null | 8.4 | null | null |
|
GHSA-rw3p-gxr5-6f26 | Cross-Site Request Forgery (CSRF) vulnerability in Bill Erickson Gallery Metabox plugin <= 1.5 versions. | []
| null | 4.3 | null | null |
|
GHSA-jh7f-2hf7-8vxp | A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file pages_transfer_money.php. The manipulation of the argument account_number with the input 357146928--><ScRiPt%20>alert(9206)</ScRiPt><!-- leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-243134 is the identifier assigned to this vulnerability. | []
| null | null | 3.5 | null |
|
CVE-2008-0873 | SQL injection vulnerability in index.php in the jlmZone Classifieds module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter in an Adsview action. | [
"cpe:2.3:a:jlmzone:classifieds:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-32873 | evmos allows transferring unvested tokens after delegations | Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. The spendable balance is not updated properly when delegating vested tokens. The issue allows a clawback vesting account to anticipate the release of unvested tokens. This vulnerability is fixed in 18.0.0. | [
"cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*"
]
| null | 3.5 | null | null |
RHSA-2016:1640 | Red Hat Security Advisory: kernel security and bug fix update | kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
]
| null | null | 7.8 | null |
GHSA-85p2-j5f7-rxg8 | Event Tracing for Windows Information Disclosure Vulnerability | []
| null | 5.5 | null | null |
|
RHSA-2021:0877 | Red Hat Security Advisory: curl security update | curl: heap buffer overflow in function tftp_receive_packet() | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
]
| null | null | 6.3 | null |
GHSA-5cjm-6wfp-gch4 | Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded. | []
| null | 6.1 | null | null |
|
CVE-2021-25973 | Publify - Improper Authorization Leads to Guest Signup Restriction Bypass | In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only. | [
"cpe:2.3:a:publify_project:publify:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-gw4f-q547-r9mg | Active Template Library Elevation of Privilege Vulnerability | []
| null | 6.7 | null | null |
|
GHSA-52rj-7m6g-jf9j | In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services. | []
| null | 5.5 | null | null |
|
RHSA-2024:4894 | Red Hat Security Advisory: thunderbird security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
]
| null | 7.5 | null | null |
GHSA-h688-rh4f-q3f8 | The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. | []
| null | 7.5 | null | null |
|
CVE-2007-1389 | dynaliens 2.0 and 2.1 allows remote attackers to bypass authentication and perform certain privileged actions via a direct request for (1) validlien.php3 (2) supprlien.php3 (3) supprub.php3 (4) validlien.php3 (5) confsuppr.php3 (6) modiflien.php3, or (7) confmodif.php3 in admin/. | [
"cpe:2.3:a:dynaliens:dynaliens:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dynaliens:dynaliens:2.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2019-13263 | D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-router into the 32-bit Transaction ID field. | [
"cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 5.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.