id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-46241 | Potential account take over due to unverified emails from Microsoft Identity Platform | `discourse-microsoft-auth` is a plugin that enables authentication via Microsoft. On sites with the `discourse-microsoft-auth` plugin enabled, an attack can potentially take control of a victim's Discourse account. Sites that have configured their application's account type to any options other than `Accounts in this organizational directory only (O365 only - Single tenant)` are vulnerable. This vulnerability has been patched in commit c40665f44509724b64938c85def9fb2e79f62ec8 of `discourse-microsoft-auth`. A `microsoft_auth:revoke` rake task has also been added which will deactivate and log out all users that have connected their accounts to Microsoft. User API keys as well as API keys created by those users will also be revoked. The rake task will also remove the connection records to Microsoft for those users. This will allow affected users to re-verify their account emails as well as reconnect their Discourse account to Microsoft for authentication. As a workaround, disable the `discourse-microsoft-auth` plugin by setting the `microsoft_auth_enabled` site setting to `false`. Run the `microsoft_auth:log_out_users` rake task to log out all users with associated Microsoft accounts.
| [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
GHSA-27x2-77hh-wh7h | A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.This issue affects Junos OS Evolved:All versions prior to 21.2R3-S8-EVO,21.4 versions prior to 21.4R3-S6-EVO,22.1 versions prior to 22.1R3-S5-EVO,22.2 versions prior to 22.2R3-S3-EVO,22.3 versions prior to 22.3R3-S3-EVO,22.4 versions prior to 22.4R3-EVO,23.2 versions prior to 23.2R2-EVO. | [] | 7 | 7.3 | null | null |
|
GHSA-6r33-3vw6-mjj9 | The LLDP implementation in Cisco IOS allows remote attackers to cause a denial of service (device reload) via a malformed packet, aka Bug ID CSCum96282. | [] | null | null | null | null |
|
CVE-2024-50363 | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands. | [
"cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2024-21831 | Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:processor_diagnostic_tool:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-xjfx-ffgc-2697 | In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from client-side template injection in list item names. | [] | null | 6.1 | null | null |
|
CVE-2012-1198 | base_ag_main.php in Basic Analysis and Security Engine (BASE) 1.4.5 allows remote attackers to execute arbitrary code by uploading contents of the file with an executable extension via a create action, then accessing it via a view action. | [
"cpe:2.3:a:secureideas:basic_analysis_and_security_engine:1.4.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-0498 | Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability | A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user. | [] | 7 | null | null | null |
GHSA-r375-j569-v9qr | A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. | [] | null | 7.3 | null | null |
|
GHSA-46pw-mqwx-ghm8 | Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of obj files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23697. | [] | null | null | 7.8 | null |
|
CVE-2019-19893 | In IXP EasyInstall 6.2.13723, there is Directory Traversal on TCP port 8000 via the Engine Service by an unauthenticated attacker, who can access the server's filesystem with the access rights of NT AUTHORITY\SYSTEM. | [
"cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2007-4546 | Unreal Commander 0.92 build 565 and 573 lists the filenames from the Central Directory of a ZIP archive, but extracts to local filenames corresponding to names in Local File Header fields in this archive, which might allow remote attackers to trick a user into performing a dangerous file overwrite or creation. | [
"cpe:2.3:a:x-diesel:unreal_commander:0.92_build565:*:*:*:*:*:*:*",
"cpe:2.3:a:x-diesel:unreal_commander:0.92_build573:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-qgvv-jpx6-4hx7 | Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via /scbs/admin/categories/manage_category.php?id=. | [] | null | 9.8 | null | null |
|
CVE-2022-0030 | PAN-OS: Authentication Bypass in Web Interface | An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-4wjx-5h7f-wqhw | In the Linux kernel, the following vulnerability has been resolved:drm: omapdrm: Add missing check for alloc_ordered_workqueueAs it may return NULL pointer and cause NULL pointer dereference. Add check
for the return value of alloc_ordered_workqueue. | [] | null | 5.5 | null | null |
|
GHSA-xj9h-242g-rjqv | An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster. | [] | null | null | 9.8 | null |
|
RHSA-2018:1318 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: KVM: error in exception handling leads to wrong debug stack value kernel: guest kernel crash during core dump on POWER9 host Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
CVE-2024-29883 | CreateWiki's wiki request suppression ignores the suppression settings set by the suppressor | CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. Suppression of wiki requests does not work as intended, and always restricts visibility to those with the `(createwiki)` user right regardless of the settings one sets on a given wiki request. This may expose information to users who are not supposed to be able to access it. | [] | null | 4.9 | null | null |
RHSA-2025:3500 | Red Hat Security Advisory: RHODF-4.17-RHEL-9 security update | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift_data_foundation:4.17::el9"
] | null | 7.5 | null | null |
CVE-2024-25596 | WordPress Doofinder for WooCommerce plugin <= 2.1.8 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder for WooCommerce allows Stored XSS.This issue affects Doofinder for WooCommerce: from n/a through 2.1.8.
| [] | null | 5.9 | null | null |
GHSA-qpr4-8773-hjx2 | An issue was discovered in the secure portal in Publisure 2.1.2. Because SQL queries are not well sanitized, there are multiple SQL injections in userAccFunctions.php functions. Using this, an attacker can access passwords and/or grant access to the user account "user" in order to become "Administrator" (for example). | [] | null | 9.8 | null | null |
|
GHSA-7jgh-3vmm-q9r5 | Handspring Visor 1.0 and 1.0.1 with the VisorPhone Springboard module installed allows remote attackers to cause a denial of service (PalmOS crash and VisorPhone database corruption) by sending a large or crafted SMS image. | [] | null | null | null | null |
|
CVE-2020-7965 | flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF. | [
"cpe:2.3:a:webargs_project:webargs:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-qpcq-4w33-hhvh | Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution. | [] | null | 9.8 | null | null |
|
CVE-2018-1565 | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner. IBM X-Force ID: 143022. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.4 | null |
|
GHSA-fpc5-jwwv-g522 | ENCDEC.DLL in Windows Media Player and Media Center in Microsoft Windows XP SP2 and SP3, Windows Vista SP2, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted .dvr-ms file, aka "Windows Media Player DVR-MS Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2010-4791 | SQL injection vulnerability in infusions/mg_user_fotoalbum_panel/mg_user_fotoalbum.php in the MG User-Fotoalbum (mg_user_fotoalbum_panel) module 1.0.1 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the album_id parameter. | [
"cpe:2.3:a:marcusg:mg_user_fotoalbum_panel:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7jpc-wcv3-h3mc | A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). The SFTP service (default port 22/tcp) of the SiNVR 3 Central Control Server (CCS) does not properly limit its capabilities to the specified purpose. In conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server could exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server. | [] | null | 9.9 | null | null |
|
RHSA-2022:6741 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition in perf_event_open leads to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.4 | null | null |
CVE-2023-6567 | The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
|
CVE-2015-9423 | The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters. | [
"cpe:2.3:a:simplysymphony:plugnedit:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2023-1663 | Authenticated Resources Accessible via Forced Browsing | Coverity versions prior to 2023.3.2 are vulnerable to forced browsing, which exposes authenticated resources to unauthorized actors. The root cause of this vulnerability is an insecurely configured servlet mapping for the underlying Apache Tomcat server. As a result, the downloads directory and its contents are accessible. 5.9 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C) | [
"cpe:2.3:a:synopsys:coverity:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-4v4v-cgjf-p5g2 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in biplob018 Shortcode Addons allows Stored XSS.This issue affects Shortcode Addons: from n/a through 3.2.5. | [] | null | 5.9 | null | null |
|
CVE-2020-35916 | An issue was discovered in the image crate before 0.23.12 for Rust. A Mutable reference has immutable provenance. (In the case of LLVM, the IR may be always correct.) | [
"cpe:2.3:a:image-rs:image:*:*:*:*:*:rust:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-45873 | A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe. | [
"cpe:2.3:a:vegabird:yaazhini:2.0.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2005-4414 | Unspecified vulnerability in Teamwork 3 before alpha 1.7 has unknown impact and attack vectors, related to "a menu security bug." | [
"cpe:2.3:a:open_lab:teamwork:alpha_1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open_lab:teamwork:alpha_1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:open_lab:teamwork:alpha_1.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-fvp6-8p9w-vffq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7. | [] | null | 8.3 | null | null |
|
CVE-2023-48545 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
RHSA-2023:3318 | Red Hat Security Advisory: go-toolset and golang security update | golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null |
CVE-2019-7018 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-vx6p-wh5p-qj6v | The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device. | [] | null | null | 5.5 | null |
|
GHSA-m4jp-mh99-vhwh | Multiple buffer overflows in EvolutionX 3921 and 3935 allow remote attackers to cause a denial of service (hang) via (1) a long cd command to the FTP server, or (2) a long dir command to the telnet server. | [] | null | null | null | null |
|
CVE-2019-16337 | The hncbd90 component in Hancom Office 9.6.1.9403 allows a use-after-free via an unknown object in a crafted .docx file. | [
"cpe:2.3:a:hancom:hancom_office_neo:9.6.1.9403:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-pphv-qf34-hrw4 | phpFileManager 0.9.8 allows remote attackers to execute arbitrary commands via a crafted URL. | [] | null | 8.8 | null | null |
|
GHSA-9jgg-4q8x-859v | A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts. | [] | null | 5.3 | null | null |
|
RHSA-2024:10752 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
CVE-2019-14751 | NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. | [
"cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*"
] | null | 5.9 | null | null |
GHSA-cmg7-xr2j-4r9v | MoinMoin Improper ACL handling for calendars and includes | MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors. | [] | null | null | null | null |
GHSA-9pmm-h9qx-3j7r | Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt. | [] | null | null | null | null |
|
GHSA-56vf-fgp4-xjqj | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in EverPress Mailster allows PHP Local File Inclusion.This issue affects Mailster: from n/a through 4.0.6. | [] | null | 8.1 | null | null |
|
GHSA-286q-p2xc-rmjg | includes/editor/insert_image.php in Pivot 1.30 RC2 and earlier creates the authentication credentials from parameters, which allows remote attackers to obtain privileges and upload arbitrary files via modified (1) pass and (2) session parameters, and (3) pass and (4) userlevel indices of the (a) Pivot_Vars[] or (b) Users[] array parameters. | [] | null | null | null | null |
|
CVE-2023-6894 | Hikvision Intercom Broadcasting System Log File system.html information disclosure | A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability. | [
"cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-bk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-dis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-in:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-info:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-kk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-kk\\/s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-kp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-kp\\/s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd3003-e6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/flush:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/ns:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/surface:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6220-le1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6320-le1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6320-tde1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6320-te1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6320-wtde1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6320-wte1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6350-wte1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6351-te1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh6351-wte1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh63le1\\(b\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh8520-wte1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh9310-wte1\\(b\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-kh9510-wte1\\(b\\):-:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 3.3 |
GHSA-5cxx-5j5m-7hp9 | A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. | [] | null | null | null | null |
|
CVE-2017-1210 | IBM Daeja ViewONE Professional, Standard & Virtual 4.1.5.1 and 5.0.2 could allow an unauthenticated attacker to inject data into log files made to look legitimate. IBM X-Force ID: 123850. | [
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:virtual:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:virtual:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:5.0.0:*:*:*:virtual:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:virtual:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-cpq4-98gj-fhjv | decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.