id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-6189 | A potential vulnerability was reported in Lenovo System Interface Foundation versions before v1.1.18.3 that could allow an administrative user to load an unsigned DLL. | [
"cpe:2.3:a:lenovo:system_interface_foundation:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-vrg6-343w-wxr6 | In the Linux kernel, the following vulnerability has been resolved:thermal/drivers/cpufreq_cooling: Fix slab OOB issueSlab OOB issue is scanned by KASAN in cpu_power_to_freq().
If power is limited below the power of OPP0 in EM table,
it will cause slab out-of-bound issue with negative array
index.Return the lowest frequency if limited power cannot found
a suitable OPP in EM table to fix this issue.Backtrace:
[<ffffffd02d2a37f0>] die+0x104/0x5ac
[<ffffffd02d2a5630>] bug_handler+0x64/0xd0
[<ffffffd02d288ce4>] brk_handler+0x160/0x258
[<ffffffd02d281e5c>] do_debug_exception+0x248/0x3f0
[<ffffffd02d284488>] el1_dbg+0x14/0xbc
[<ffffffd02d75d1d4>] __kasan_report+0x1dc/0x1e0
[<ffffffd02d75c2e0>] kasan_report+0x10/0x20
[<ffffffd02d75def8>] __asan_report_load8_noabort+0x18/0x28
[<ffffffd02e6fce5c>] cpufreq_power2state+0x180/0x43c
[<ffffffd02e6ead80>] power_actor_set_power+0x114/0x1d4
[<ffffffd02e6fac24>] allocate_power+0xaec/0xde0
[<ffffffd02e6f9f80>] power_allocator_throttle+0x3ec/0x5a4
[<ffffffd02e6ea888>] handle_thermal_trip+0x160/0x294
[<ffffffd02e6edd08>] thermal_zone_device_check+0xe4/0x154
[<ffffffd02d351cb4>] process_one_work+0x5e4/0xe28
[<ffffffd02d352f44>] worker_thread+0xa4c/0xfac
[<ffffffd02d360124>] kthread+0x33c/0x358
[<ffffffd02d289940>] ret_from_fork+0xc/0x18 | [] | null | 5.5 | null | null |
|
CVE-2021-45958 | UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. | [
"cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-222m-mgc9-9mqv | Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. | [] | null | null | null | null |
|
CVE-2007-6286 | Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request. | [
"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-28042 | stb_image.h v2.27 was discovered to contain an heap-based use-after-free via the function stbi__jpeg_huff_decode. | [
"cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-m3x4-xj3g-vgpg | IBM Spectrum Scale 4.2 and 5.0 could allow a local unprivileged attacker with intimate knowledge of the enviornment to execute commands as root using specially crafted input. IBM X-Force ID: 175977. | [] | null | null | null | null |
|
CVE-2016-4209 | Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2017-15355 | Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal. | [
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tx50_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tx50_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tx50:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-mvv5-mhx3-8h8f | The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods. | [] | null | null | 9.8 | null |
|
GHSA-8j48-r5wc-gvr3 | An unauthenticated user can trigger a fatal assertion in the server while generating ftdc diagnostic metrics due to attempting to build a BSON object that exceeds certain memory sizes. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.16 and MongoDB Server v6.0 versions prior to and including 6.0.5. | [] | null | 5.3 | null | null |
|
GHSA-7h5f-8vcf-w422 | A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is the function delete_category of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
RHSA-2024:4075 | Red Hat Security Advisory: kpatch-patch security update | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_e4s:8.6::baseos"
] | null | 7.8 | null | null |
CVE-2020-7512 | A CWE-1103: Use of Platform-Dependent Third Party Components with vulnerabilities vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to exploit the component. | [
"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2023:1467 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: tun: avoid double free in tun_free_netdev | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7.8 | null | null |
CVE-2014-1728 | Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-1660 | Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code. | [
"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-38730 | IBM Spectrum Copy Data Management information disclosure | IBM Storage Copy Data Management 2.2.0.0 through 2.2.19.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 262268. | [
"cpe:2.3:a:ibm:storage_copy_data_management:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2019-14968 | An issue was discovered in imcat 4.9. There is SQL Injection via the index.php order parameter in a mod=faqs action. | [
"cpe:2.3:a:txjia:imcat:4.9:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2019-3599 | McAfee Agent update fixes an Information Disclosure vulnerability | Information Disclosure vulnerability in Remote logging (which is disabled by default) in McAfee Agent (MA) 5.x allows remote unauthenticated users to access sensitive information via remote logging when it is enabled. | [
"cpe:2.3:a:mcafee:agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:agent:5.6.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
CVE-2024-5350 | anji-plus AJ-Report pageList sql injection | A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been classified as critical. Affected is the function pageList of the file /pageList. The manipulation of the argument p leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266262 is the identifier assigned to this vulnerability. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2021-21695 | FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-r5mh-xxhf-v5gq | HotelDruid before v2.3.1 has SQL Injection via the /tab_tariffe.php numtariffa1 parameter. | [] | null | null | 9.8 | null |
|
GHSA-mhjf-f5q6-785c | Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board.This issue affects Simple Job Board: from n/a through 2.10.6. | [] | null | 4.3 | null | null |
|
GHSA-6xw3-vghf-g62f | PhotoKorn allows remote attackers to obtain database credentials via a direct request to update/update3.php, which includes the credentials in its output. | [] | null | null | null | null |
|
GHSA-8rjg-q394-qc97 | The Easy Forms for Mailchimp WordPress plugin through 6.8.8 does not sanitise and escape some of its from parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
CVE-2006-2459 | SQL injection vulnerability in messages.php in PHP-Fusion 6.00.307 and earlier allows remote authenticated users to execute arbitrary SQL commands via the srch_where parameter. | [
"cpe:2.3:a:php_fusion:php_fusion:6.00.306:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:6.00.307:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2021-33962 | China Mobile An Lianbao WF-1 router v1.0.1 is affected by an OS command injection vulnerability in the web interface /api/ZRUsb/pop_usb_device component. | [
"cpe:2.3:o:chinamobileltd:an_lianbao_wf_firmware-1:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:chinamobileltd:an_lianbao_wf-1:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2007-2523 | CA Anti-Virus for the Enterprise r8 and Threat Manager r8 before 20070510 use weak permissions (NULL security descriptor) for the Task Service shared file mapping, which allows local users to modify this mapping and gain privileges by triggering a stack-based buffer overflow in InoCore.dll before 8.0.448.0. | [
"cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:anti-virus_for_the_enterprise:8:*:enterprise:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-r4rp-m7m9-jrfv | There is a CSV injection vulnerability in some HikCentral Master Lite versions. If exploited, an attacker could build malicious data to generate executable commands in the CSV file. | [] | 5.5 | 9.8 | null | null |
|
GHSA-f3pg-xh2r-fcrw | In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. | [] | null | null | null | null |
|
CVE-2024-48846 | Cross Side Request Forgery, CSRF | Cross Site Request Forgery vulnerabilities where found providing a potiential for exposing sensitive information or changing system settings.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02 | [
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] | 7.1 | 7.1 | null | null |
GHSA-7hrw-67rx-qfvf | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | null | null |
|
RHSA-2014:0245 | Red Hat Security Advisory: activemq security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
GHSA-qc4q-2g46-mpx9 | Unknown vulnerability in the LIST functionality in CommuniGate Pro before 4.3c3 allows remote attackers to cause a denial of service (server crash) via certain multipart messages. | [] | null | null | null | null |
|
RHSA-2024:5390 | Red Hat Security Advisory: bind9.16 security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
GHSA-8g2j-v7wm-mhv5 | A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service. | [] | null | 5.5 | null | null |
|
GHSA-686q-7454-35qj | This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.The specific flaw exists within the telematics functionality, which operates over HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. | [] | null | 8.1 | null | null |
|
GHSA-27q4-qhjq-3v56 | SAP BusinessObjects Business Intelligence Platform (Fiori BI Launchpad), before version 4.2, allows execution of JavaScript in a text module in Fiori BI Launchpad, leading to Stored Cross Site Scripting vulnerability. | [] | null | null | null | null |
|
CVE-2023-48166 | A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system. | [
"cpe:2.3:a:unify:openscape_voice:10.0:-:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-5501 | phpBB 3.2.8 allows a CSRF attack that can modify a group avatar. | [
"cpe:2.3:a:phpbb:phpbb:3.2.8:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
CVE-2022-24166 | Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the manualTime parameter. | [
"cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2017-15204 | In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user. | [
"cpe:2.3:a:kanboard:kanboard:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.46:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
RHSA-2023:3428 | Red Hat Security Advisory: cups-filters security update | cups-filters: remote code execution in cups-filters, beh CUPS backend | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
CVE-2020-22019 | Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service. | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
cisco-sa-sdwan-xss-zQ4KPvYd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 6.4 | null | null |
GHSA-xfmh-hq5h-g7mp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder – WordPress Page Builder allows Stored XSS.This issue affects Beaver Builder – WordPress Page Builder: from n/a through 2.7.2. | [] | null | 6.5 | null | null |
|
GHSA-hxq2-8x4p-5j8p | The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc. | [] | null | null | 8.8 | null |
|
CVE-2024-47554 | Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader | Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.
This issue affects Apache Commons IO: from 2.0 before 2.14.0.
Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue. | [] | null | 4.3 | null | null |
CVE-2021-20355 | IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891. | [
"cpe:2.3:a:ibm:jazz_team_server:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 3.7 | null |
|
CVE-2023-35139 | A cross-site scripting (XSS) vulnerability in the CGI program of the Zyxel ATP series firmware versions 5.10 through 5.37, USG FLEX series firmware versions 5.00 through 5.37, USG FLEX 50(W) series firmware versions 5.10 through 5.37, USG20(W)-VPN series firmware versions 5.10 through 5.37, and VPN series firmware versions 5.00 through 5.37, could allow an unauthenticated LAN-based attacker to store malicious scripts in a vulnerable device. A successful XSS attack could then result in the stored malicious scripts being executed to steal cookies when the user visits the specific CGI used for dumping ZTP logs. | [
"cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vpn50w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*"
] | null | 5.2 | null | null |
|
CVE-2024-28557 | SQL Injection vulnerability in Sourcecodester php task management system v1.0, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via crafted payload to update-admin.php. | [
"cpe:2.3:a:sourcecodester:php_task_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2016:1237 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: Integer and buffer overflow in coders/icon.c ImageMagick: Integer truncation vulnerability in coders/pict.c ImageMagick: Crash due to out of bounds error in SpliceImage ImageMagick: Prevent NULL pointer access in magick/constitute.c ImageMagick: Remote code execution via filename ImageMagick,GraphicsMagick: Gnuplot delegate vulnerability allowing command injection ImageMagick: SVG converting issue resulting in DoS | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-636j-9grp-54fw | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Brainstorm Force Spectra allows Code Injection.This issue affects Spectra: from n/a through 2.3.0. | [] | null | 5.3 | null | null |
|
GHSA-cqp5-5522-8hhp | A vulnerability has been identified in DCA Vantage Analyzer (All versions < V4.5 are affected by CVE-2020-7590. In addition, serial numbers < 40000 running software V4.4.0 are also affected by CVE-2020-15797). Affected devices use a hard-coded password to protect the onboard database. This could allow an attacker to read and or modify the onboard database. Successful exploitation requires direct physical access to the device. | [] | null | null | null | null |
|
GHSA-wv6g-jqfr-crx7 | The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.29. This is due to missing or incorrect nonce validation on a saveAsCopy function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2013-4198 | mail_password.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to bypass the prohibition on password changes via the forgotten password email functionality. | [
"cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2015-5830 | The Intel Graphics Driver component in Apple OS X before 10.11 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5877. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-w3ff-vvc7-jg8f | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
CVE-2022-48984 | can: slcan: fix freed work crash | In the Linux kernel, the following vulnerability has been resolved:
can: slcan: fix freed work crash
The LTP test pty03 is causing a crash in slcan:
BUG: kernel NULL pointer dereference, address: 0000000000000008
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 348 Comm: kworker/0:3 Not tainted 6.0.8-1-default #1 openSUSE Tumbleweed 9d20364b934f5aab0a9bdf84e8f45cfdfae39dab
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
Workqueue: 0x0 (events)
RIP: 0010:process_one_work (/home/rich/kernel/linux/kernel/workqueue.c:706 /home/rich/kernel/linux/kernel/workqueue.c:2185)
Code: 49 89 ff 41 56 41 55 41 54 55 53 48 89 f3 48 83 ec 10 48 8b 06 48 8b 6f 48 49 89 c4 45 30 e4 a8 04 b8 00 00 00 00 4c 0f 44 e0 <49> 8b 44 24 08 44 8b a8 00 01 00 00 41 83 e5 20 f6 45 10 04 75 0e
RSP: 0018:ffffaf7b40f47e98 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff9d644e1b8b48 RCX: ffff9d649e439968
RDX: 00000000ffff8455 RSI: ffff9d644e1b8b48 RDI: ffff9d64764aa6c0
RBP: ffff9d649e4335c0 R08: 0000000000000c00 R09: ffff9d64764aa734
R10: 0000000000000007 R11: 0000000000000001 R12: 0000000000000000
R13: ffff9d649e4335e8 R14: ffff9d64490da780 R15: ffff9d64764aa6c0
FS: 0000000000000000(0000) GS:ffff9d649e400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 0000000036424000 CR4: 00000000000006f0
Call Trace:
<TASK>
worker_thread (/home/rich/kernel/linux/kernel/workqueue.c:2436)
kthread (/home/rich/kernel/linux/kernel/kthread.c:376)
ret_from_fork (/home/rich/kernel/linux/arch/x86/entry/entry_64.S:312)
Apparently, the slcan's tx_work is freed while being scheduled. While
slcan_netdev_close() (netdev side) calls flush_work(&sl->tx_work),
slcan_close() (tty side) does not. So when the netdev is never set UP,
but the tty is stuffed with bytes and forced to wakeup write, the work
is scheduled, but never flushed.
So add an additional flush_work() to slcan_close() to be sure the work
is flushed under all circumstances.
The Fixes commit below moved flush_work() from slcan_close() to
slcan_netdev_close(). What was the rationale behind it? Maybe we can
drop the one in slcan_netdev_close()?
I see the same pattern in can327. So it perhaps needs the very same fix. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-rq23-3cx8-wmqf | Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-jxfv-m3f6-ch5r | Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium) | [] | null | 6.5 | null | null |
|
CVE-2024-47394 | WordPress WP JobSearch plugin <= 2.5.9 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in eyecix JobSearch allows Reflected XSS.This issue affects JobSearch: from n/a through 2.5.9. | [] | null | 7.1 | null | null |
CVE-2016-7082 | VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allow guest OS users to execute arbitrary code on the host OS or cause a denial of service (host OS memory corruption) via an EMF file. | [
"cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 5.9 |
|
GHSA-jxc5-x72r-w93v | An off-by-one error in WLInfoRailService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS. | [] | null | null | 7.5 | null |
|
CVE-2022-35426 | UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file. | [
"cpe:2.3:a:ucms_project:ucms:1.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2020-0811 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0812. | [
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.6 |
|
CVE-2024-33109 | Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function. | [
"cpe:2.3:o:ergophone:tiptel_ip_286_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ergophone:tiptel_ip_286:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yealink:sip-t28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yealink:sip-t28p:-:*:*:*:*:*:*:*"
] | null | 9.9 | null | null |
|
RHSA-2012:1012 | Red Hat Security Advisory: mod_cluster security update | mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list | [
"cpe:/a:redhat:jboss_enterprise_web_server:1.0"
] | null | null | null | null |
GHSA-wjfv-xp2f-fp9w | In event_handler of keymaster_app.c, there is possible resource exhaustion due to a table being lost on reboot. This could lead to local denial of service that is not fixed by a factory reset, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116055338. | [] | null | null | 5.5 | null |
|
CVE-2020-20971 | Cross Site Request Forgery (CSRF) vulnerability in PbootCMS v2.0.3 via /admin.php?p=/User/index. | [
"cpe:2.3:a:pbootcms:pbootcms:2.0.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2024-26063 | Adobe Experience Manager | Information Exposure (CWE-200) | Adobe Experience Manager versions 6.5.19 and earlier are affected by an Information Exposure vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to gain unauthorized access to sensitive information, potentially bypassing security measures. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.3 | null | null |
GHSA-wx4c-p4xc-46fq | IBM Security Verify Governance, Identity Manager 10.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257772. | [] | null | 6.5 | null | null |
|
CVE-2020-10593 | Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit. | [
"cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2023:3450 | Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.3 | null | null |
CVE-2018-10368 | An issue was discovered in WUZHI CMS 4.1.0. The "Extension Module -> System Announcement" feature has Stored XSS via an announcement. | [
"cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2023-44400 | Uptime Kuma has Persistentent User Sessions | Uptime Kuma is a self-hosted monitoring tool. Prior to version 1.23.3, attackers with access to a user's device can gain persistent account access. This is caused by missing verification of Session Tokens after password changes and/or elapsed inactivity periods. Version 1.23.3 has a patch for the issue. | [
"cpe:2.3:a:uptime.kuma:uptime_kuma:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
CVE-2023-30350 | FS S3900-24T4S devices allow authenticated attackers with guest access to escalate their privileges and reset the admin password. | [
"cpe:2.3:o:fs:s3900_24t4s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fs:s3900_24t4s:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2022-43713 | Interactive Forms (IAF) in GX Software XperienCentral versions 10.33.1 until 10.35.0 was vulnerable to invalid data input because form validation could be bypassed. | [
"cpe:2.3:a:gxsoftware:xperiencentral:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-mg9r-pcrh-rr7f | An issue in Archer Platform before v.6.13 and fixed in 6.12.0.6 and 6.13.0 allows an authenticated attacker to obtain sensitive information via a crafted URL. | [] | null | 7.5 | null | null |
|
GHSA-3vpc-63g5-hmgh | The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 allows Directory Traversal via a forged HTTP request. | [] | null | null | 5.3 | null |
|
CVE-2014-9607 | Cross-site scripting (XSS) vulnerability in remotereporter/load_logfiles.php in Netsweeper 4.0.3 and 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the url parameter. | [
"cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2010-0260 | Heap-based buffer overflow in Microsoft Office Excel 2007 SP1 and SP2; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted spreadsheet in which "a MDXTUPLE record is broken up into several records," aka "Microsoft Office Excel MDXTUPLE Record Heap Overflow Vulnerability." | [
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-33875 | HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5O__layout_encode in H5Olayout.c, resulting in the corruption of the instruction pointer. | [] | null | 5.7 | null | null |
|
CVE-2022-27881 | engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation. | [
"cpe:2.3:a:openbsd:openbsd:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openbsd:7.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2009-0776 | nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-8fw8-q35x-6438 | A vulnerability was found in code-projects Simple Admin Panel 1.0 and classified as problematic. This issue affects some unknown processing of the file addCatController.php. The manipulation of the argument c_name leads to cross site scripting. The attack may be initiated remotely. | [] | 5.3 | 3.5 | null | null |
|
CVE-2022-41686 | Out-of-bound memory read and write in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The proc ... | OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. | [
"cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*",
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] | null | 5.1 | null | null |
CVE-2011-5279 | CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header. | [
"cpe:2.3:a:microsoft:internet_information_services:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-5069 | Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 use guessable session tokens, which are in the URL. | [
"cpe:2.3:o:sierrawireless:aleos_firmware:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:gx_440:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-cm42-569j-qx8w | The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address. | [] | null | null | null | null |
|
GHSA-c788-rmfv-wwr2 | Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1748. | [] | null | null | null | null |
|
GHSA-h3vq-5r52-r6hp | Privilege escalation vulnerability in the AMS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 7.8 | null | null |
|
GHSA-fgm2-2fhw-x8fx | A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to execute arbitrary code. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages to the affected software. A successful exploit could allow the attacker to cause the application to execute arbitrary programs on the targeted system with the privileges of the user account that is running the Cisco Jabber client software, possibly resulting in arbitrary code execution. | [] | null | null | null | null |
|
GHSA-xrqw-4q5c-x35c | Integer overflow in the in_nsv plugin in Winamp before 5.6 allows remote attackers to have an unspecified impact via vectors related to improper allocation of memory for NSV metadata, a different vulnerability than CVE-2010-2586. | [] | null | null | null | null |
|
GHSA-qv98-3369-g364 | KubeVirt vulnerable to arbitrary file read on host | ImpactUsers with the permission to create VMIs can construct VMI specs which allow them to read arbitrary files on the host. There are three main attack vectors:Some path fields on the VMI spec were not properly validated and allowed passing in relative paths which would have been mounted into the virt-launcher pod. The fields are: `spec.domain.firmware.kernelBoot.container.kernelPath`, `spec.domain.firmware.kernelBoot.container.initrdPath` as well as `spec.volumes[*].containerDisk.path`.Example:Instead of passing in relative links on the API, using malicious links in the containerDisk itself can have the same effect:KubeVirt allows PVC hotplugging. The hotplugged PVC is under user-control and it is possible to place absolute links there. Since containerDisk and hotplug code use the same mechanism to provide the disk to the virt-launcher pod, it can be used too to do arbitrary host file reads.In all three cases it is then possible to at lest read any host file:PatchesKubeVirt 0.55.1 provides patches to fix the vulnerability.WorkaroundsEnsure that the `HotplugVolumes` feature-gate is disabledContainerDisk support can't be disabled. The only known way to mitigate this issue is create with e.g. policy controller a conditiontemplate which ensures that no containerDisk gets added and that `spec.domain.firmware.kernelBoot` is not used on VirtualMachineInstances.|Ensure that SELinux is enabled. It blocks most attempts to read host files but does not provide a 100% guarantee (like vm-to-vm read may still work).ReferencesDisclosure notice form the discovering party: https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hmFor more informationFor interested vendors which have to provide a fix for their supported versions, the following PRs are providing the fix:https://github.com/kubevirt/kubevirt/pull/8198https://github.com/kubevirt/kubevirt/pull/8268CreditsOliver Brooks and James Klopchic of NCC Group
Diane Dubois and Roman Mohr of Google | [] | null | null | null | null |
CVE-2016-5843 | Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters. | [
"cpe:2.3:a:otrs:faq:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:faq:5.0.3:*:*:*:*:*:*:*"
] | null | null | 9.4 | 9 |
|
GHSA-hh2w-p6rv-4g7w | Microsoft Security Advisory CVE-2024-30105 | .NET Denial of Service Vulnerability | Microsoft Security Advisory CVE-2024-30105 | .NET Denial of Service Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A vulnerability exists in .NET when calling the JsonSerializer.DeserializeAsyncEnumerable method against an untrusted input using System.Text.Json may result in Denial of Service.DiscussionDiscussion for this issue can be found at https://github.com/dotnet/runtime/issues/104619<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 8.0 application running on .NET 8.0.6 or earlier.<a name="affected-packages"></a>Affected PackagesThe vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below<a name=".NET 8"></a>.NET 8Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Text.Json](https://www.nuget.org/packages/System.Text.Json) | >= 7.0.0, < =8.0.3 | 8.0.4Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-packages) or [affected packages](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 8.0 . If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you're using .NET 8.0, you should download and install .NET 8.0.7 Runtime or .NET 8.0.107 SDK (for Visual Studio 2022 v17.8) from https://dotnet.microsoft.com/download/dotnet-core/8.0..NET 8.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 8.0 or .NET 7.0 or .NET 6.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2024-30105]( https://www.cve.org/CVERecord?id=CVE-2024-30105)RevisionsV1.0 (July 09, 2024): Advisory published._Version 1.0__Last Updated 2024-07-09_ | [] | 8.7 | 7.5 | null | null |
CVE-2008-2596 | Unspecified vulnerability in the Mobile Application Server component in Oracle E-Business Suite 12.0.3 has unknown impact and remote authenticated attack vectors. | [
"cpe:2.3:a:oracle:e-business_suite:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mobile_application_server:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2023-34004 | WordPress WooCommerce Box Office Plugin <= 1.1.50 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Box Office plugin <= 1.1.50 versions. | [
"cpe:2.3:a:woocommerce:woocommerce_box_office:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.