id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9qhr-vp5g-278f | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1706, CVE-2015-1711, and CVE-2015-1718. | []
| null | null | null | null |
|
RHSA-2020:0467 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | 3.7 | null | null |
CVE-2024-11821 | Privilege Escalation in langgenius/dify | A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properly enforce access controls on the endpoint /console/api/apps/{chatbot-id}/model-config, allowing unauthorized users to alter chatbot configurations. | []
| null | null | 4.3 | null |
GHSA-2j49-q898-whm9 | Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Silf::readGraphite function. | []
| null | null | 9.1 | null |
|
CVE-2025-4972 | Incorrect Authorization in GitLab | An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated users with invitation privileges to bypass group-level user invitation restrictions by manipulating group invitation functionality. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
]
| null | 2.7 | null | null |
CVE-2016-0028 | Outlook Web Access (OWA) in Microsoft Exchange Server 2013 SP1, Cumulative Update 11, and Cumulative Update 12 and 2016 Gold and Cumulative Update 1 does not properly restrict loading of IMG elements, which makes it easier for remote attackers to track users via a crafted HTML e-mail message, aka "Microsoft Exchange Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook_web_access:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
CVE-2007-0461 | Multiple memory leaks in the Dazuko anti-virus helper module before 2.3.2 allow attackers to cause a denial of service (memory consumption) via unknown vectors. | [
"cpe:2.3:a:dazuko:dazuko:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2001-1065 | Web-based configuration utility in Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap binds itself to port 80 even when web-based configuration services are disabled, which could leave the router open to attack. | [
"cpe:2.3:o:cisco:cbos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cbos:2.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2021-32598 | An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response. | [
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
|
CVE-2024-25420 | An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component. | [
"cpe:2.3:a:igniterealtime:openfire:4.9.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
RHSA-2018:3096 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: AIO write triggers integer overflow in some protocols kernel: Information leak when handling NM entries containing NUL kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation kernel: Handling of might_cancel queueing is not properly pretected against race kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service kernel: Mishandling mutex within libsas allowing local Denial of Service kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption kernel: Denial of service in resv_map_release function in mm/hugetlb.c kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function kernel: MIDI driver race condition leads to a double-free kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | null | 5.8 | null |
GHSA-hxjx-pwv6-xr2h | XSS was discovered in the RegistrationMagic plugin 4.6.0.0 for WordPress via the rm_form_id, rm_tr, or form_name parameter. | []
| null | null | null | null |
|
GHSA-mp69-237m-xm5h | There is an invalid free in MiniPS::delete0 in minips.cpp that leads to a Segmentation fault in sam2p 0.49.4. A crafted input will lead to a denial of service or possibly unspecified other impact. | []
| null | null | 9.8 | null |
|
CVE-2014-7154 | Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors. | [
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.1 |
|
CVE-2023-38126 | Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability | Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root. Was ZDI-CAN-20543. | [
"cpe:2.3:a:softing:edgeaggregator:3.4.0:*:*:*:*:*:*:*"
]
| null | null | 7.2 | null |
CVE-2018-13586 | The mintToken function of a smart contract implementation for Nectar (NCTR), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:nectarcoin_project:nectarcoin:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-8qh4-fghr-6fxg | Improper Limitation of a Pathname to a Restricted Directory in Jenkins Google OAuth Credentials Plugin | An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master. | []
| null | 6.5 | null | null |
GHSA-2w3r-44jw-2779 | SQL injection vulnerability in DeskLance 2.3 and earlier allows remote attackers to execute arbitrary SQL commands via the announce parameter. | []
| null | null | null | null |
|
GHSA-6xj4-vchf-pfcc | The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing web content may lead to a denial-of-service. | []
| null | 6.5 | null | null |
|
GHSA-wq89-rrp5-4864 | rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conversion, which leads to a stack-based buffer overflow and allows remote attackers to execute arbitrary code via a crafted NFS request. | []
| null | null | null | null |
|
GHSA-h24f-49f9-gqhv | QuickTime for Java in Apple Quicktime before 7.2 does not perform sufficient "access control," which allows remote attackers to obtain sensitive information (screen content) via crafted Java applets. | []
| null | null | null | null |
|
CVE-2017-13903 | An issue was discovered in certain Apple products. iOS before 11.2.1 is affected. tvOS before 11.2.1 is affected. The issue involves the "HomeKit" component. It allows remote attackers to modify the application state by leveraging incorrect message handling, as demonstrated by use of an Apple Watch to obtain an encryption key and unlock a door. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2018-18799 | School Attendance Monitoring System 1.0 has CSRF via event/controller.php?action=photos. | [
"cpe:2.3:a:school_attendance_monitoring_system_project:school_attendance_monitoring_system:1.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-qfr9-grrj-c6fg | An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "OpenPAM" component, which allows local users to obtain sensitive information by leveraging mishandling of failed PAM authentication by a sandboxed app. | []
| null | null | 6.2 | null |
|
CVE-2023-21088 | In deliverOnFlushComplete of LocationProviderManager.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-235823542 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2023-45863 | An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
|
CVE-2024-5116 | SourceCodester Online Examination System save.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265196. | [
"cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*"
]
| 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2016-7871 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2017-5866 | The autocomplete feature in the E-Mail share dialog in ownCloud Server before 8.1.11, 8.2.x before 8.2.9, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows remote authenticated users to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:8.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:9.1.2:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4 |
|
CVE-2007-2739 | Cross-site scripting (XSS) vulnerability in xajax before 0.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:xajax:xajax:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2019-1373 | A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'. | [
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2024-56138 | Timestamp signature generation lacks certificate revocation check in notion-go | notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | []
| null | 4 | null | null |
GHSA-65qr-hw9g-m785 | Unspecified vulnerability in the Oracle Database Vault component in Oracle Database 9.2.0.8DV and 10.2.0.3 has unknown impact and remote attack vectors, aka DB21. | []
| null | null | null | null |
|
RHSA-2024:1876 | Red Hat Security Advisory: shim bug fix update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 5.1 | null | null |
GHSA-frpq-wjg3-5rp5 | CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate. | []
| null | null | null | null |
|
RHSA-2003:033 | Red Hat Security Advisory: tcpdump security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
]
| null | null | null | null |
GHSA-rm67-m8xv-vmxp | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges. | []
| null | 7.8 | null | null |
|
GHSA-9fc9-pcc6-hcpv | In Wireshark 2.6.0 to 2.6.3, the Steam IHS Discovery dissector could consume system memory. This was addressed in epan/dissectors/packet-steam-ihs-discovery.c by changing the memory-management approach. | []
| null | null | 7.5 | null |
|
GHSA-232f-8fc5-f649 | Multiple SQL injection vulnerabilities in Advanced Webhost Billing System (AWBS) before 2.6.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: this can be leveraged for XSS attacks that "bypass AWBS's anti-XSS input validation." | []
| null | null | null | null |
|
GHSA-q7rv-p9gv-mcj9 | Foxit PDF Reader Annotation Use of Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14658. | []
| null | null | 7.8 | null |
|
RHSA-2022:1417 | Red Hat Security Advisory: kernel security update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: cgroups v1 release_agent feature may allow privilege escalation | [
"cpe:/o:redhat:rhel_els:6"
]
| null | 7 | null | null |
GHSA-xwhx-3qqx-64m9 | In the Linux kernel, the following vulnerability has been resolved:wifi: mac8021: fix possible oob access in ieee80211_get_rate_durationFix possible out-of-bound access in ieee80211_get_rate_duration routine
as reported by the following UBSAN report:UBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47
index 15 is out of range for type 'u16 [12]'
CPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic
Hardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017
Workqueue: mt76 mt76u_tx_status_data [mt76_usb]
Call Trace:
<TASK>
show_stack+0x4e/0x61
dump_stack_lvl+0x4a/0x6f
dump_stack+0x10/0x18
ubsan_epilogue+0x9/0x43
__ubsan_handle_out_of_bounds.cold+0x42/0x47
ieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]
? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]
ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]
ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]
mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]
mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]
mt76u_tx_status_data+0x67/0xd0 [mt76_usb]
process_one_work+0x225/0x400
worker_thread+0x50/0x3e0
? process_one_work+0x400/0x400
kthread+0xe9/0x110
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x22/0x30 | []
| null | 7.8 | null | null |
|
GHSA-r7c8-hghc-2mp8 | Apache Tomcat Allows Replacing of XML Parser | Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. NOTE: this vulnerability exists because of a CVE-2009-0783 regression. | []
| null | null | null | null |
GHSA-6h82-hhr3-9q29 | The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation on the WISE-PaaS/RMM (versions prior to 9.0.1). | []
| null | null | null | null |
|
CVE-2022-21294 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17.0.1:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
GHSA-75hg-r5jg-vhx7 | A vulnerability classified as problematic has been found in SourceCodester Online Admission System. This affects an unknown part of the file /index.php. The manipulation of the argument student_add leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-206163. | []
| null | 6.1 | null | null |
|
GHSA-9mmm-86g7-vp9g | The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers. | []
| null | 9.8 | null | null |
|
GHSA-9424-v24c-9mgm | Buffer overflow in Foxmail 6.5 allows remote attackers to execute arbitrary code via a long mailto URI in the HREF attribute of an A element. | []
| null | null | null | null |
|
GHSA-m44w-8hgf-c6f4 | Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.2, 6.3 before 6.3.0.6, 7.0 before 7.0.0.6, 7.5 before 7.5.0.5, and 8.0 before 8.0.0.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | []
| null | null | null | null |
|
CVE-2023-25040 | WordPress Shortcodes Ultimate Plugin <= 5.12.6 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Vova Anokhin WordPress Shortcodes Plugin — Shortcodes Ultimate plugin <= 5.12.6 versions. | [
"cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
GHSA-p22h-292c-g64q | Cross-site request forgery (CSRF) vulnerability in Blogn (BURO GUN) 1.9.7 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that make content modifications. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
GHSA-rvmq-4x66-q7j3 | Remote code execution (RCE) in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting `load_examples=False` in the config then you are not vulnerable. | []
| 8.7 | 8.8 | null | null |
CVE-2024-22354 | IBM WebSphere Application Server XML external entity injection | IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.5 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401. | [
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*"
]
| null | 7 | null | null |
RHSA-2016:1581 | Red Hat Security Advisory: kernel security update | kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko | [
"cpe:/o:redhat:rhel_aus:6.4::server"
]
| null | null | 7.8 | null |
GHSA-gf8f-vgc3-8m3x | Directory traversal vulnerability in ifx CGI program in Informix Web DataBlade allows remote attackers to read arbitrary files via a .. (dot dot) in the LO parameter. | []
| null | null | null | null |
|
CVE-2018-4990 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-8459-9grp-5w5j | A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation. | []
| null | 9.9 | null | null |
|
CVE-2006-5309 | PHP remote file inclusion vulnerability in language/lang_french/lang_prillian_faq.php in the Prillian French 0.8.0 and earlier module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:phpbb:prillian_french:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-6vxx-q37m-5prg | An issue has been found in function DCTStream::reset in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 8 . | []
| null | null | null | null |
|
GHSA-h4wh-f8w7-hph3 | Microsoft PostScript Printer Driver Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
GHSA-q8w2-r6p5-v4mx | UPNP Service listening on port 5555 in Genexis Platinum 4410 Router V2.1 has an action 'X_GetAccess' which leaks the credentials of 'admin', provided that the attacker is network adjacent. | []
| null | null | null | null |
|
CVE-2025-26931 | WordPress Tribulant Gallery Voting plugin <= 1.2.1 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Software Tribulant Gallery Voting allows Stored XSS. This issue affects Tribulant Gallery Voting: from n/a through 1.2.1. | []
| null | 7.1 | null | null |
CVE-2024-23482 | ZScalerService Local Privilege Escalation | The ZScaler service is susceptible to a local privilege escalation vulnerability found in the ZScalerService process. Fixed Version: Mac ZApp 4.2.0.241 and later.
| [
"cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*"
]
| null | 7 | null | null |
GHSA-xc2q-wjq7-w4gw | A java deserialization vulnerability in HPE Remote Insight Support allows an unauthenticated attacker to execute code. | []
| null | 8.1 | null | null |
|
GHSA-qv3v-qfq2-p7vh | lib.php in the Submission comments plugin in the Assignment module in Moodle 2.3.x before 2.3.4 and 2.4.x before 2.4.1 allows remote attackers to read or modify the submission comments (aka feedback comments) of arbitrary users via a crafted URI. | []
| null | null | null | null |
|
RHSA-2008:0517 | Red Hat Security Advisory: evolution security update | evolution: iCalendar buffer overflow via large timezone specification | [
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
]
| null | null | null | null |
CVE-2019-9367 | In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112106425 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-qq6p-768q-h7g2 | A flaw was discovered in htmodoc 1.9.12 in function parse_paragraph in ps-pdf.cxx ,this flaw possibly allows possible code execution and a denial of service via a crafted file. | []
| null | 7.8 | null | null |
|
CVE-2023-47217 | Arkruntime has a buffer overflow vulnerability | in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
]
| null | 4 | null | null |
GHSA-gwrh-986r-9p55 | The mintToken function of a smart contract implementation for Cornerstone, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | []
| null | null | 7.5 | null |
|
CVE-2023-50262 | Dompdf possible DoS caused by infinite recursion when parsing SVG images | Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself.
php-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images.
When Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request.
Version 2.0.4 contains a fix for this issue. | [
"cpe:2.3:a:dompdf_project:dompdf:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
CVE-2007-1296 | SQL injection vulnerability in postingdetails.php in AJ Classifieds 1.0 allows remote attackers to execute arbitrary SQL commands via the postingid parameter. | [
"cpe:2.3:a:aj_square:aj_classifieds:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
ICSA-21-355-01 | mySCADA myPRO | An unauthenticated remote attacker can access the application without any form of authentication or authorization.CVE-2021-43985 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). The affected product stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.CVE-2021-43989 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). An additional, nondocumented administrative account exists in the affected product that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.CVE-2021-43987 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.CVE-2021-44453 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.CVE-2021-22657 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.CVE-2021-23198 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.CVE-2021-43981 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.CVE-2021-43984 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). | []
| null | null | 10 | null |
CVE-2017-17322 | Huawei Honor Smart Scale Application with software of 1.1.1 has an information disclosure vulnerability. The application does not sufficiently restrict the resource which can be accessed by certain protocol. An attacker could trick the user to click a malicious link, successful exploit could cause information disclosure. | [
"cpe:2.3:o:huawei:honor_smart_scale_application_firmware:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_smart_scale_application:-:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 |
|
GHSA-p43f-q89p-7fm6 | Directory traversal vulnerability in Voyager web server 2.01B in the demo disks for QNX 405 allows remote attackers to read arbitrary files via a .. (dot dot) attack. | []
| null | null | null | null |
|
CVE-2024-2748 | CSRF vulnerability was identified in GitHub Enterprise Server that allowed performing actions on behalf of a user | A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
| []
| null | 4.3 | null | null |
CVE-2015-5606 | Vordel XML Gateway (acquired by Axway) version 7.2.2 could allow remote attackers to cause a denial of service via a specially crafted request. | [
"cpe:2.3:a:axway:vordel_xml_gateway:7.2.2:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-x4mf-ppgr-9fg2 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpjobportal WP Job Portal allows Blind SQL Injection. This issue affects WP Job Portal: from n/a through 2.3.2. | []
| null | 9.3 | null | null |
|
GHSA-xc2g-3f28-fmc4 | A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes). This issue affects: Juniper Networks Junos OS 20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6; 20.3 version 20.3R3-S2 and later versions prior to 20.3R3-S5; 20.4 version 20.4R3-S1 and later versions prior to 20.4R3-S4 21.1 version 21.1R3 and later versions prior to 21.1R3-S3; 21.2 version 21.2R1-S2, 21.2R2-S1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R2 and later versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.4-EVO version 20.4R3-S1-EVO and later versions prior to 20.4R3-S6-EVO; 21.2-EVO version 21.2R1-S2-EVO and later versions prior to 21.2R3-S4-EVO; 21.3-EVO version 21.3R2-EVO and later versions prior to 21.3R3-S1-EVO; 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. | []
| null | 5.5 | null | null |
|
CVE-2014-0333 | The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero. | [
"cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2007-4449 | The client in Toribash 2.71 and earlier allows remote attackers to cause a denial of service (application hang) via a command without an LF character, as demonstrated by a SAY command. | [
"cpe:2.3:a:toribash:toribash:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2024-26075 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
]
| null | 5.4 | null | null |
GHSA-5m95-8m7x-3gcp | Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. | []
| null | 7.5 | null | null |
|
GHSA-fqg4-3q52-9x7c | A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | null | 6.3 | null |
|
GHSA-7539-ww58-9j9g | HP Asset Manager 9.40 and 9.41 before 9.41.11103 P4-rev1 and 9.50 before 9.50.11925 P3 allows local users to obtain sensitive information via unspecified vectors. | []
| null | null | null | null |
|
CVE-2018-2609 | Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Security). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Agile PLM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Agile PLM accessible data as well as unauthorized read access to a subset of Oracle Agile PLM accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.6:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 5.8 |
|
GHSA-j8jw-g6fq-mp7h | SQL injection in hibernate-core | A flaw was found in hibernate-core in versions prior to 5.3.20.Final and in 5.4.0.Final up to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. | []
| null | 7.4 | null | null |
GHSA-xp7g-78mw-jp2h | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. | []
| null | null | null | null |
|
CVE-2014-7463 | The IM5 Fans Planet (aka uk.co.pixelkicks.im5) application 2.3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:im5_fans_planet_project:im5_fans_planet:2.3.1:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
GHSA-ggrw-3wvm-4w3q | The kernel in Apple iOS before 6 dereferences invalid pointers during the handling of packet-filter data structures, which allows local users to gain privileges via a crafted program that makes packet-filter ioctl calls. | []
| null | null | null | null |
|
GHSA-m5rc-2hfw-9w66 | Buffer overflow in the Loader_XM::load_instrument_internal function in loader_xm.cpp for Cheese Tracker 0.9.9 and earlier allows user-assisted attackers to execute arbitrary code via a crafted file with a large amount of extra data. | []
| null | null | null | null |
|
GHSA-q975-8hh3-m9wj | The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the "Profiler" page. | []
| null | 5.3 | null | null |
|
GHSA-6fvf-x8c6-2f6j | Cross-site Scripting (XSS) in DataObject Any Getter grid operator | ImpactStored cross site scripting vulnerability in operator any getter in dataobject grid configuration.PatchesUpdate to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch manually.Referenceshttps://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2/ | []
| null | 5.4 | null | null |
CVE-2014-2657 | Unspecified vulnerability in the print release functionality in PaperCut MF before 14.1 (Build 26983) has unknown impact and remote vectors, related to embedded MFPs. | [
"cpe:2.3:a:papercut:papercut_mf:14.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-hxrm-74mf-m4wm | Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to reflected Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions. | []
| null | 4.8 | null | null |
|
RHSA-2019:1821 | Red Hat Security Advisory: rh-nodejs8-nodejs security update | nodejs: HTTP request splitting nodejs: Denial of Service with large HTTP headers nodejs: Slowloris HTTP Denial of Service nodejs: Hostname spoofing in URL parser for javascript protocol nodejs-tar: Arbitrary file overwrites when extracting tarballs containing a hard-link nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 5.3 | null |
CVE-2020-10391 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-article.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
GHSA-5wcr-xg97-jwqq | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | []
| null | null | null | null |
|
CVE-2014-0734 | SQL injection vulnerability in the Certificate Authority Proxy Function (CAPF) implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCum46483. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2016-10423 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, and SD 820A, when a Trusted Application has opened the SPI interface to a particular device, it is possible for another Trusted Application to read the data on this open interface due to non-exclusive access of the SPI bus. | [
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.