id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-m3v9-92vc-xc79 | CVE was unused by HPE. | [] | null | null | null | null |
|
CVE-2023-50266 | Bazarr Blind Server-Side Request Forgery (SSRF) in the /test/<protocol>/ endpoint | Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols. | [
"cpe:2.3:a:bazarr:bazarr:1.2.4:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-q54j-8934-v8rh | SQL injection vulnerability in the downloads module in Koobi Pro 5.7 allows remote attackers to execute arbitrary SQL commands via the categ parameter to index.php. NOTE: it was later reported that this also affects Koobi CMS 4.2.4, 4.2.5, and 4.3.0. | [] | null | null | null | null |
|
CVE-2023-38149 | Windows TCP/IP Denial of Service Vulnerability | Windows TCP/IP Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4851:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4851:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4851:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4851:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1970:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1964:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2416:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2416:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3448:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3448:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3448:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2283:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2283:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3448:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3448:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3448:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20162:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20162:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6252:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6252:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6252:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.26713:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24462:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.21563:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-28jp-g4gg-47fp | On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements. | [] | null | null | 7.5 | null |
|
CVE-2021-36950 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*"
] | null | 5.4 | null | null |
GHSA-q2jw-4pf6-6hm6 | Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010. | [] | null | null | null | null |
|
CVE-2014-4211 | Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.7 and 11.1.1.8 allows remote attackers to affect integrity via unknown vectors related to Portlet Services. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.8.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7qxf-jhcq-jx9g | Cross-site request forgery (CSRF) vulnerability in EMC Documentum Web Development Kit (WDK) before 6.8 allows remote attackers to hijack the authentication of arbitrary users for requests that perform Docbase operations. | [] | null | null | null | null |
|
CVE-2015-0137 | IBM PowerVC Standard 1.2.0.x before 1.2.0.4 and 1.2.1.x before 1.2.2 validates Hardware Management Console (HMC) certificates only during the pre-login stage, which allows man-in-the-middle attackers to spoof devices via a crafted certificate. | [
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:-:-:-:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:-:-:-:standard:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-0762 | Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
RHSA-2024:9885 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser | [
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
] | null | 7.5 | null | null |
GHSA-m2cc-qv47-86r8 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. | [] | null | 7.8 | null | null |
|
CVE-2023-4983 | app1pro Shopicial search cross site scripting | A vulnerability was found in app1pro Shopicial up to 20230830. It has been declared as problematic. This vulnerability affects unknown code of the file search. The manipulation of the argument from with the input comments</script>'"><img src=x onerror=alert(document.cookie)> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239794 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:app1pro:shopicial:*:*:*:*:*:shopify:*:*"
] | null | 4.3 | 4.3 | 5 |
CVE-2025-37772 | RDMA/cma: Fix workqueue crash in cma_netevent_work_handler | In the Linux kernel, the following vulnerability has been resolved:
RDMA/cma: Fix workqueue crash in cma_netevent_work_handler
struct rdma_cm_id has member "struct work_struct net_work"
that is reused for enqueuing cma_netevent_work_handler()s
onto cma_wq.
Below crash[1] can occur if more than one call to
cma_netevent_callback() occurs in quick succession,
which further enqueues cma_netevent_work_handler()s for the
same rdma_cm_id, overwriting any previously queued work-item(s)
that was just scheduled to run i.e. there is no guarantee
the queued work item may run between two successive calls
to cma_netevent_callback() and the 2nd INIT_WORK would overwrite
the 1st work item (for the same rdma_cm_id), despite grabbing
id_table_lock during enqueue.
Also drgn analysis [2] indicates the work item was likely overwritten.
Fix this by moving the INIT_WORK() to __rdma_create_id(),
so that it doesn't race with any existing queue_work() or
its worker thread.
[1] Trimmed crash stack:
=============================================
BUG: kernel NULL pointer dereference, address: 0000000000000008
kworker/u256:6 ... 6.12.0-0...
Workqueue: cma_netevent_work_handler [rdma_cm] (rdma_cm)
RIP: 0010:process_one_work+0xba/0x31a
Call Trace:
worker_thread+0x266/0x3a0
kthread+0xcf/0x100
ret_from_fork+0x31/0x50
ret_from_fork_asm+0x1a/0x30
=============================================
[2] drgn crash analysis:
>>> trace = prog.crashed_thread().stack_trace()
>>> trace
(0) crash_setup_regs (./arch/x86/include/asm/kexec.h:111:15)
(1) __crash_kexec (kernel/crash_core.c:122:4)
(2) panic (kernel/panic.c:399:3)
(3) oops_end (arch/x86/kernel/dumpstack.c:382:3)
...
(8) process_one_work (kernel/workqueue.c:3168:2)
(9) process_scheduled_works (kernel/workqueue.c:3310:3)
(10) worker_thread (kernel/workqueue.c:3391:4)
(11) kthread (kernel/kthread.c:389:9)
Line workqueue.c:3168 for this kernel version is in process_one_work():
3168 strscpy(worker->desc, pwq->wq->name, WORKER_DESC_LEN);
>>> trace[8]["work"]
*(struct work_struct *)0xffff92577d0a21d8 = {
.data = (atomic_long_t){
.counter = (s64)536870912, <=== Note
},
.entry = (struct list_head){
.next = (struct list_head *)0xffff924d075924c0,
.prev = (struct list_head *)0xffff924d075924c0,
},
.func = (work_func_t)cma_netevent_work_handler+0x0 = 0xffffffffc2cec280,
}
Suspicion is that pwq is NULL:
>>> trace[8]["pwq"]
(struct pool_workqueue *)<absent>
In process_one_work(), pwq is assigned from:
struct pool_workqueue *pwq = get_work_pwq(work);
and get_work_pwq() is:
static struct pool_workqueue *get_work_pwq(struct work_struct *work)
{
unsigned long data = atomic_long_read(&work->data);
if (data & WORK_STRUCT_PWQ)
return work_struct_pwq(data);
else
return NULL;
}
WORK_STRUCT_PWQ is 0x4:
>>> print(repr(prog['WORK_STRUCT_PWQ']))
Object(prog, 'enum work_flags', value=4)
But work->data is 536870912 which is 0x20000000.
So, get_work_pwq() returns NULL and we crash in process_one_work():
3168 strscpy(worker->desc, pwq->wq->name, WORKER_DESC_LEN);
============================================= | [] | null | null | null | null |
RHSA-2023:4347 | Red Hat Security Advisory: libeconf security update | libeconf: stack-based buffer overflow in read_file() in lib/getfilecontents.c libeconf: Stack overflow in function read_file at libeconf/lib/getfilecontents.c | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
CVE-2024-57933 | gve: guard XSK operations on the existence of queues | In the Linux kernel, the following vulnerability has been resolved:
gve: guard XSK operations on the existence of queues
This patch predicates the enabling and disabling of XSK pools on the
existence of queues. As it stands, if the interface is down, disabling
or enabling XSK pools would result in a crash, as the RX queue pointer
would be NULL. XSK pool registration will occur as part of the next
interface up.
Similarly, xsk_wakeup needs be guarded against queues disappearing
while the function is executing, so a check against the
GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the
disabling of the bit and the synchronize_net() in gve_turndown. | [] | null | 5.5 | null | null |
CVE-2008-4573 | SQL injection vulnerability in kategori.asp in MunzurSoft Wep Portal W3 allows remote attackers to execute arbitrary SQL commands via the kat parameter. | [
"cpe:2.3:a:aspindir:munzursoft_web_portal_w3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-75q5-4hc3-3q65 | An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there. | [] | null | 6.7 | null | null |
|
RHSA-2019:1707 | Red Hat Security Advisory: ansible security and bug fix update | ansible: unsafe template evaluation of returned module data can lead to information disclosure | [
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 4.6 | null |
CVE-2006-3676 | admin/gallery_admin.php in planetGallery before 14.07.2006 allows remote attackers to execute arbitrary PHP code by uploading files with a double extension and directly accessing the file in the images directory, which bypasses a regular expression check for safe file types. | [
"cpe:2.3:a:planet_concept:planetgallery:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2021-21922 | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘username_filter’ parameter with the administrative account or through cross-site request forgery. | [
"cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*"
] | null | null | 7.7 | null |
|
CVE-2020-10015 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2015-8285 | The webssx.sys driver in QuickHeal 16.00 allows remote attackers to cause a denial of service. | [
"cpe:2.3:a:quickheal:total_security:16.00:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-39c3-54g3-jw3m | The 10Web Photo Gallery plugin before 1.5.25 for WordPress has Authenticated Local File Inclusion via directory traversal in the wp-admin/admin-ajax.php?action=shortcode_bwg tagtext parameter. | [] | null | null | 4.9 | null |
|
CVE-2020-0939 | An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0937, CVE-2020-0945, CVE-2020-0946, CVE-2020-0947. | [
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2015-7536 | Cross-site scripting (XSS) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to workspaces and archived artifacts. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
RHSA-2017:3427 | Red Hat Security Advisory: org.ovirt.engine-root security, bug fix, and enhancement update | ovirt-engine: webadmin log out must logout all sessions | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 3.8 | null |
GHSA-jq6p-4382-pqcc | Integer overflow in osagent.exe in Borland VisiBroker Smart Agent 08.00.00.C1.03 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet with a large string length value to UDP port 14000, which triggers a heap-based buffer overflow. | [] | null | null | null | null |
|
CVE-2002-0617 | The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by creating a hyperlink on a drawing shape in a source workbook that points to a destination workbook containing an autoexecute macro, aka "Hyperlinked Excel Workbook Macro Bypass." | [
"cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2000:sr1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2022-38533 | In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file. | [
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-j867-5cxm-5qrg | The klassens (aka com.mcreda.klassens.apps) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-84hm-26hq-gff5 | Plesk CMS 18.0.37 is affected by an insecure permissions vulnerability that allows privilege Escalation from user to admin rights. | [] | null | 8.8 | null | null |
|
GHSA-88x6-wvf3-98hv | The Aqua Look and Feel for Java implementation in Java 1.5 on Mac OS X 10.5 allows remote attackers to execute arbitrary code via a call to the undocumented apple.laf.CColourUIResource constructor with a crafted value in the first argument, which is dereferenced as a pointer. | [] | null | null | null | null |
|
GHSA-3jqv-cvgq-g32j | Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-g7pg-ghhx-ph55 | Tenda A18 v15.03.05.05 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function. | [] | null | 8.8 | null | null |
|
CVE-2016-1044 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, CVE-2016-1039, CVE-2016-1040, CVE-2016-1041, CVE-2016-1042, CVE-2016-1062, and CVE-2016-1117. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 10 | 10 |
|
GHSA-f886-x4w4-9rwj | An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process. | [] | null | 5.5 | null | null |
|
RHSA-2023:4692 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | python-django: Potential denial-of-service vulnerability in file uploads python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
] | null | 7.5 | null | null |
CVE-2021-37311 | Buffer Overflow vulnerability in fcitx5 5.0.8 allows attackers to cause a denial of service via crafted message to the application's listening port. | [
"cpe:2.3:a:fcitx_5_project:fcitx_5:5.0.8:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2017-18245 | The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file. | [
"cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-r4vw-gj85-84vr | The affected application lacks proper validation of user-supplied data when parsing project files (e.g.., CSP). This could lead to an out-of-bounds read in IO_CFG. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2020-16006 | Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-jx7c-7mj5-9438 | Apache Tomcat Race Condition vulnerability | The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. | [] | null | 3.7 | null | null |
CVE-2017-1523 | IBM InfoSphere Master Data Management - Collaborative Edition 11.5 could allow an unauthorized user to download reports without authentication. IBM X-Force ID: 129892. | [
"cpe:2.3:a:ibm:infosphere_master_data_management:11.5:*:*:*:collaborative:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-9jg4-fxwc-3f69 | Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1. | [] | null | 7.1 | null | null |
|
GHSA-grf4-rjfm-p934 | Unrestricted file upload vulnerability in admin/upload_files.php in Zomplog 3.8.1 and earlier allows remote authenticated administrators to upload and execute arbitrary .php files by sending a modified MIME type. NOTE: this can be exploited by unauthenticated attackers by leveraging CVE-2007-5230. | [] | null | null | null | null |
|
CVE-2020-2262 | Jenkins Android Lint Plugin 2.6 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | [
"cpe:2.3:a:jenkins:android_lint:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
RHSA-2021:5048 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.4 | 6.1 | null |
CVE-2010-5295 | Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2007-1533 | The Teredo implementation in Microsoft Windows Vista uses the same nonce for communication with different UDP ports within a solicitation session, which makes it easier for remote attackers to spoof the nonce through brute force attacks. | [
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-44792 | handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. | [
"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-h2j6-v888-8gxm | A vulnerability in the management access list configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured management interface access list on an affected system. The vulnerability is due to the configuration of different management access lists, with ports allowed in one access list and denied in another. An attacker could exploit this vulnerability by sending crafted remote management traffic to the local IP address of an affected system. A successful exploit could allow the attacker to bypass the configured management access list policies, and traffic to the management interface would not be properly denied. | [] | null | null | null | null |
|
GHSA-8wj4-x8pg-9cqw | Multiple cross-site scripting (XSS) vulnerabilities in PHPOLL 0.96 allow remote attackers to inject arbitrary web script or HTML via the language parameter to (1) index.php, (2) info.php; and (3) index.php, (4) votanti.php, (5) risultati_config.php, (6) modifica_band.php, (7) band_editor.php, and (8) config_editor.php in admin/. | [] | null | null | null | null |
|
RHSA-2007:1177 | Red Hat Security Advisory: autofs5 security update | autofs default doesn't set nodev in /net | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-66q9-f7ff-mmx6 | Local file inclusion vulnerability in http4s | ImpactThis vulnerability applies to all users of:`org.http4s.server.staticcontent.FileService``org.http4s.server.staticcontent.ResourceService``org.http4s.server.staticcontent.WebjarService`Path escapingURI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can expose resources outside of the configured location. Specifically:`FileService` may expose any file on the local file system.`ResourceService` may expose any resource on the class path.Prefix matchingWhen the service is configured with a non-empty `pathPrefix` that doesn't end in a slash, any directories whose names are a prefix of `systemPath` (from `FileService`) or `pathPrefix` (from `ResourceService`) are exposed. For example, if `pathPrefix` is `/foo` and `systemPath` is `/bar`, a request to `/foobaz/quux.txt` exposes file `/barbaz/quux.txt`, when only files beneath `/bar` should be available.URI decodingURI segments are not decoded before resource resolution. This causes resources with reserved characters in their name to incorrectly return a 404. It also may incorrectly expose the rare resource whose name is URI encoded. This applies to `FileService`, `ResourceService`, and `WebjarService`.PatchesIn all three services, paths with an empty segment, a `.` segment, or a `..` segment are now rejected with a `400 Bad Request` response. This fixes exposure outside the configured root. Many clients already eliminate dot segments according to the rules in [RFC3986, Section 5.2.4](https://tools.ietf.org/html/rfc3986#section-5.2.4). A middleware that does so at the server level may be considered if there is demand.If `pathInfo` is non-empty, and does not begin with `/`, then a 404 response is generated. This fixes the prefix matching exposure.All path segments are URI decoded before being passed to the file system or resource path. This allows resolution of resources with reserved characters in the name, and prevents incorrect exposure of resources whose names are themselves URI encoded.WorkaroundsThe recommended course is to upgrade:v0.18.26, binary compatible with the 0.18.x seriesv0.20.20, binary compatible with the 0.20.x seriesv0.21.2, binary compatible with the 0.21.x seriesNote that 0.19.0 is a deprecated release and has never been supported.If an upgrade is impossible:Temporarily copy `FileService.scala`, `ResourceService.scala`, and `WebjarService.scala` from the appropriate release series into your project and recompile with that, changing the package name and reference in your application.Users of a servlet backend can use the servlet container's file serving capabilities.CreditsThank you to Thomas Gøytil for the discovery, responsible disclosure, and assistance testing of this vulnerability.For more informationIf you have any questions or comments about this advisory:Open an issue in [http4s/http4s](http://github.com/http4s/http4s)Email a maintainer:[Ross A. Baker](mailto:[email protected]) | [] | null | 7.6 | null | null |
GHSA-cw9v-q2h7-7x99 | A vulnerability in Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to read arbitrary files that they originally did not have permissions to access. | [] | null | null | null | null |
|
GHSA-xj6h-22hm-62qq | Multiple cross-site scripting (XSS) vulnerabilities in Pligg CMS before 1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) page parameter to (a) admin/admin_comments.php or (b) admin/admin_links.php; or list parameter in a (3) move or (4) minimize action to (c) admin/admin_index.php. | [] | null | null | null | null |
|
CVE-2019-0912 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2023-26084 | The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable. | [
"cpe:2.3:a:arm:aarch64cryptolib:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
|
GHSA-5wg9-5w3f-hxmh | Moodle Users could elevate their role when accessing the LTI tool on a provider site | A vulnerability was found in moodle before versions 3.6.3, 3.5.5 and 3.4.8. Users could assign themselves an escalated role within courses or content accessed via LTI, by modifying the request to the LTI publisher site. | [] | null | 8.8 | null | null |
cisco-sa-20180207-ucm | Cisco Unified Communications Manager Information Disclosure Vulnerability | A vulnerability in Cisco Unified Communications Manager could allow an authenticated, remote attacker to access sensitive information on an affected system.
The vulnerability exists because the affected software improperly validates user-supplied search input. An attacker could exploit this vulnerability by sending malicious requests to an affected system. A successful exploit could allow the attacker to retrieve sensitive information from the affected system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm"] | [] | null | null | 4.3 | null |
GHSA-gpww-5rqj-3jh7 | The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts. | [] | null | 9.8 | null | null |
|
CVE-2007-3402 | SQL injection vulnerability in index.php in pagetool 1.07 allows remote attackers to execute arbitrary SQL commands via the news_id parameter in a pagetool_news action. | [
"cpe:2.3:a:pagetool:pagetool:1.07:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2006-5088 | PHP remote file inclusion vulnerability in connected_users.lib.php3 in phpHeaven phpMyChat 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the ChatPath parameter. | [
"cpe:2.3:a:phpheaven:phpmychat:0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-6916 | Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname. | [
"cpe:2.3:h:siemens:speedstream_5200:-:*:*:*:*:*:*:*",
"cpe:2.3:a:john_doe:netport_software:1.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-225m-c7c9-rg4x | Certain HP LaserJet Pro print products are potentially vulnerable to an Elevation of Privilege and/or Information Disclosure related to a lack of authentication with certain endpoints. | [] | null | 9.8 | null | null |
|
GHSA-rc75-xwh9-8v23 | An issue was discovered in creditease-sec insight through 2018-09-11. depart_delete in srcpm/app/admin/views.py allows CSRF. | [] | null | null | 8.8 | null |
|
GHSA-j8m6-hgfm-cp2q | Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137. | [] | null | null | 7.8 | null |
|
CVE-2020-2795 | Vulnerability in the Oracle Knowledge product of Oracle Knowledge (component: Information Manager Console). Supported versions that are affected are 8.6.0-8.6.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Knowledge executes to compromise Oracle Knowledge. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Knowledge. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:knowledge:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | null |
|
GHSA-6hqq-pc57-hq65 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
|
CVE-2021-38462 | InHand Networks IR615 Router | InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf. | [
"cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*",
"cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2024-6360 | Incorrect Permission Assignment for Critical Resource vulnerability has been discovered in OpenText™ Vertica. | Incorrect Permission Assignment for Critical Resource vulnerability in OpenText™ Vertica could allow Privilege Abuse and result in unauthorized access or privileges to Vertica agent apikey.
This issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X. | [] | 6.9 | null | null | null |
RHSA-2023:6886 | Red Hat Security Advisory: plexus-archiver security update | plexus-archiver: Arbitrary File Creation in AbstractUnArchiver | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
CVE-2025-23740 | WordPress Easy School Registration plugin <= 3.9.8 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy School Registration allows Reflected XSS. This issue affects Easy School Registration: from n/a through 3.9.8. | [] | null | 7.1 | null | null |
GHSA-6975-wf7j-2rx4 | The Email Field module 6.x-1.x before 6.x-1.3 for Drupal, when using a field permission module and the field contact field formatter is set to the full or teaser display mode, does not properly check permissions, which allows remote attackers to email the stored address via unspecified vectors. | [] | null | null | null | null |
|
GHSA-999m-cq5c-hqgx | The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network. | [] | null | null | 5.9 | null |
|
CVE-2017-7970 | A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to specify Arbitrary Server Target Nodes in connection requests to the Secure Gateway and Server components. | [
"cpe:2.3:a:schneider-electric:powerscada_anywhere:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:powerscada_expert:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:powerscada_expert:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citect_anywhere:1.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 3.3 |
|
GHSA-5pc6-9cmx-jhrg | CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database. | [] | null | null | null | null |
|
CVE-2021-20177 | A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 |
|
CVE-2003-1281 | cgihtml 1.69 allows local users to overwrite arbitrary files via a symlink attack on certain temporary files. | [
"cpe:2.3:a:eekim:cgihtml:1.69:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-whff-r7hf-mx5w | In the YOP Poll WordPress plugin before 6.2.8, when a pool is created with the options "Allow other answers", "Display other answers in the result list" and "Show results", it can lead to Stored Cross-Site Scripting issues as the 'Other' answer is not sanitised before being output in the page. The execution of the XSS payload depends on the 'Show results' option selected, which could be before or after sending the vote for example. | [] | null | null | null | null |
|
GHSA-rjwc-235r-8986 | A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13. | [] | null | 4.7 | null | null |
|
GHSA-wqpc-58rm-xq5r | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in cmssoft CSV Product Import Export for WooCommerce allows SQL Injection.This issue affects CSV Product Import Export for WooCommerce: from n/a through 1.0.0. | [] | null | 8.5 | null | null |
|
CVE-2022-20300 | In Content, there is a possible way to check if the given account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200956588 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2024-26595 | mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path | In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after
failing to attach the region to an ACL group, we hit a NULL pointer
dereference upon 'region->group->tcam' [1].
Fix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam().
[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
RIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0
[...]
Call Trace:
mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20
mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
mlxsw_sp_acl_rule_add+0x47/0x240
mlxsw_sp_flower_replace+0x1a9/0x1d0
tc_setup_cb_add+0xdc/0x1c0
fl_hw_replace_filter+0x146/0x1f0
fl_change+0xc17/0x1360
tc_new_tfilter+0x472/0xb90
rtnetlink_rcv_msg+0x313/0x3b0
netlink_rcv_skb+0x58/0x100
netlink_unicast+0x244/0x390
netlink_sendmsg+0x1e4/0x440
____sys_sendmsg+0x164/0x260
___sys_sendmsg+0x9a/0xe0
__sys_sendmsg+0x7a/0xc0
do_syscall_64+0x40/0xe0
entry_SYSCALL_64_after_hwframe+0x63/0x6b | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-8p2w-hr9c-gc2j | The Long (aka com.imop.longjiang.android) application 1.0.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
RHSA-2020:5165 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Inappropriate implementation in V8 chromium-browser: Inappropriate implementation in base chromium-browser: Use after free in site isolation | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
GHSA-q247-wj3r-2x97 | Files or Directories Accessible to External Parties vulnerability in Eliz Software Panel allows Collect Data from Common Resource Locations.This issue affects Panel: before v2.3.24. | [] | 9.2 | 7.5 | null | null |
|
GHSA-fr85-4pwv-vvc4 | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, tvOS 16.3, iOS 16.3 and iPadOS 16.3, watchOS 9.3. Processing an image may lead to a denial-of-service. | [] | null | 7.5 | null | null |
|
GHSA-62rf-g5f7-frmw | jsish version 2.4.70 2.047 contains a CWE-125: Out-of-bounds Read vulnerability in function jsi_ObjArrayLookup (jsiObj.c:274) that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute crafted javascript code. This vulnerability appears to have been fixed in 2.4.71. | [] | null | null | 6.5 | null |
|
GHSA-wmjh-g52p-x87p | PHP remote file inclusion vulnerability in codebreak.php in CodeBreak, probably 1.1.2 and earlier, allows remote attackers to execute arbitrary PHP code via a URL in the process_method parameter. | [] | null | null | null | null |
|
RHSA-2011:0888 | Red Hat Security Advisory: seamonkey security update | Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Cookie isolation error (MFSA 2011-24) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2023-45056 | WordPress Open User Map | Everybody can add locations Plugin <= 1.3.26 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 100plugins Open User Map plugin <= 1.3.26 versions. | [
"cpe:2.3:a:100plugins:open_user_map:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2010-5147 | The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic. | [
"cpe:2.3:a:websense:websense_web_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_security:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_security:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_security:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_security:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_security:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:websense_web_filter:7.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-37847 | An arbitrary file upload vulnerability in MangoOS before 5.1.4 and Mango API before 4.5.5 allows attackers to execute arbitrary code via a crafted file. | [
"cpe:2.3:o:radix_iot:mango_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:radix_iot:mango_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*",
"cpe:2.3:a:radixiot:mangoapi:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2006-6706 | SQL injection vulnerability in Soumu Workflow for Groupmax 01-00 through 01-01, Soumu Workflow 02-00 through 03-03, and Koukyoumuke Soumu Workflow 01-00 through 01-01 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors in certain web pages. | [
"cpe:2.3:a:soumu:koukyoumuke_soumu_workflow:01-00:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:koukyoumuke_soumu_workflow:01-01:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:soumo_workflow:01_00:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:soumo_workflow:01_01:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:soumu_workflow:02-00:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:soumu_workflow:02-01:*:*:*:*:*:*:*",
"cpe:2.3:a:soumu:soumu_workflow:03-03:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-ww5h-7qqv-pq53 | An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. SVoice allows Hare Hunting during application installation. The Samsung ID is SVE-2016-6942 (February 2017). | [] | null | null | null | null |
|
CVE-2022-38700 | multimedia subsystem has a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service. | OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service. | [
"cpe:2.3:a:openharmony:openharmony:3.1.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-54vx-xvq8-jh85 | Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c. | [] | null | null | 9.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.