id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-945j-48p3-f37w
tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.
[]
null
null
null
null
RHSA-2023:5405
Red Hat Security Advisory: virt:av and virt-devel:av security update
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image
[ "cpe:/a:redhat:advanced_virtualization:8.4::el8" ]
null
3.3
null
null
CVE-2019-0906
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0904, CVE-2019-0905, CVE-2019-0907, CVE-2019-0908, CVE-2019-0909, CVE-2019-0974.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
CVE-2000-1026
Multiple buffer overflows in LBNL tcpdump allow remote attackers to execute arbitrary commands.
[ "cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-f2f8-4q6m-2pw8
In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prematurely, gorouter marks the currently selected backend as failed and removes it from the routing pool.
[]
null
5.9
null
null
CVE-2023-32844
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).
[ "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-7r58-q49c-fx4m
In Parse_ptbl of eas_mdls.c, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127313537
[]
null
null
null
null
CVE-1999-0764
NetBSD allows ARP packets to overwrite static ARP entries.
[ "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-72p8-v4hg-v45p
Weak private key generation in SSH.NET
During an **X25519** key exchange, the client’s private is generated with [**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random):Source: [KeyExchangeECCurve25519.cs](https://github.com/sshnet/SSH.NET/blob/bc99ada7da3f05f50d9379f2644941d91d5bf05a/src/Renci.SshNet/Security/KeyExchangeECCurve25519.cs#L51) Source commit: https://github.com/sshnet/SSH.NET/commit/b58a11c0da55da1f5bad46faad2e9b71b7cb35b3[**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random) is not a cryptographically secure random number generator, it must therefore not be used for cryptographic purposes.ImpactWhen establishing an SSH connection to a remote host, during the X25519 key exchange, the private key is generated with a weak random number generator whose seed can be bruteforced. This allows an attacker able to eavesdrop the communications to decrypt them.WorkaroundsTo ensure you're not affected by this vulnerability, you can disable support for `curve25519-sha256` and `[email protected]` key exchange algorithms by invoking the following method before a connection is established:ThanksThis issue was initially reported by **Siemens AG, Digital Industries**, shortly followed by @yaumn-synacktiv.
[]
null
6.5
null
null
GHSA-p3mp-3q3j-c55p
A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
null
null
GHSA-jrf2-626v-253x
Unspecified vulnerability in HP Service Manager 7.02, 7.11, 9.20, and 9.21 and Service Center 6.2.8 allows remote attackers to modify data or obtain sensitive information via unknown vectors.
[]
null
null
null
null
CVE-2021-45746
A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java.
[ "cpe:2.3:a:webank:wecube:3.2.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2009-0088
The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:office_converter_pack:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2023-35083
Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information.
[ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-j9xf-4c4g-rqx3
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPExperts.io License Manager for WooCommerce allows Reflected XSS. This issue affects License Manager for WooCommerce: from n/a through 3.0.9.
[]
null
7.1
null
null
GHSA-w3vr-rmjm-3c4g
Missing Authorization vulnerability in WooCommerce WooCommerce Shipping Per Product.This issue affects WooCommerce Shipping Per Product: from n/a through 2.5.4.
[]
null
4.3
null
null
CVE-2008-0147
SQL injection vulnerability in index.php in SmallNuke 2.0.4 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via (1) the user_email parameter and possibly (2) username parameter in a Members action.
[ "cpe:2.3:a:smallnuke:smallnuke:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2024-53856
rPGP Panics on Malformed Untrusted Input
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1.
[]
null
7.5
null
null
GHSA-6vgf-7pw4-vmph
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in softdiscover Zigaform – Form Builder Lite allows Stored XSS. This issue affects Zigaform – Form Builder Lite: from n/a through 7.4.2.
[]
null
7.1
null
null
RHSA-2022:0495
Red Hat Security Advisory: .NET 5.0 security and bugfix update
dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
CVE-2013-2800
The OSIsoft PI Interface for IEEE C37.118 before 1.0.6.158 allows remote attackers to cause a denial of service (memory consumption or memory corruption, instance shutdown, and data-collection outage) via crafted C37.118 configuration packets.
[ "cpe:2.3:a:osisoft:pi_interface:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_interface:1.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_interface:1.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_interface:1.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_interface:1.0.4.88:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2006-6757
Directory traversal vulnerability in index.php in cwmExplorer 1.0 allows remote attackers to read arbitrary files and source code, and obtain sensitive information via directory traversal sequences in the show_file parameter.
[ "cpe:2.3:a:cwm-design:cwmexplorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:cwm-design:cwmexplorer:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-w78w-58gh-8v4r
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044035.
[]
null
4.4
null
null
CVE-2024-55892
Potential Open Redirect via Parsing Differences in TYPO3
TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\CMS\Core\Http\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability.
[]
null
4.8
null
null
GHSA-f6hc-gf8c-phf5
A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.8 is able to address this issue. The name of the patch is c8e22c1340c11fedfb0a0a67ea690421bdb62b94. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222320.
[]
null
6.1
null
null
CVE-2024-11554
IrfanView DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
IrfanView DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24754.
[ "cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*" ]
null
null
7.8
null
GHSA-8r7w-7c78-x8mm
In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964917.
[]
null
null
null
null
CVE-2019-13973
LayerBB 1.1.3 allows admin/general.php arbitrary file upload because the custom_logo filename suffix is not restricted, and .php may be used.
[ "cpe:2.3:a:layerbb:layerbb:1.1.3:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2023-45707
HCL Connections Docs is vulnerable to Cross-Site Scripting (XSS)
HCL Connections Docs is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary code. This may lead to credentials disclosure and possibly launch additional attacks.
[]
null
4.4
null
null
GHSA-hc62-j25w-cgcv
An issue was discovered in ONAP APPC before Dublin. By using an exposed unprotected Jolokia interface, an unauthenticated attacker can read or overwrite an arbitrary file. All APPC setups are affected.
[]
null
null
null
null
GHSA-3qjh-r982-mhgp
Cross-Site Request Forgery (CSRF) vulnerability in rollbar Rollbar allows Cross Site Request Forgery. This issue affects Rollbar: from n/a through 2.7.1.
[]
null
5.4
null
null
CVE-2020-8298
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
[ "cpe:2.3:a:fs-path_project:fs-path:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
10
GHSA-qf3g-cg7v-c4x9
In the Linux kernel, the following vulnerability has been resolved:drm: zynqmp_kms: Unplug DRM device before removalPrevent userspace accesses to the DRM device from causing use-after-frees by unplugging the device before we remove it. This causes any further userspace accesses to result in an error without further calls into this driver's internals.
[]
null
7.8
null
null
CVE-2006-4057
Buffer overflow in the preview_create function in gui.cpp in Mitch Murray Eremove 1.4 allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a large email attachment.
[ "cpe:2.3:a:mitch_murray:eremove:1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-13200
The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Reflected XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.
[ "cpe:2.3:o:kyocera:ecosys_m5526cdw_firmware:2r7_2000.001.701:*:*:*:*:*:*:*", "cpe:2.3:h:kyocera:ecosys_m5526cdw:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
RHSA-2021:3889
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
null
null
GHSA-w8rx-73fm-r2mv
The Fatek Automation WinProladder Versions 3.3 and prior are vulnerable to an integer underflow, which may cause an out-of-bounds write and allow an attacker to execute arbitrary code.
[]
null
null
null
null
GHSA-rj7p-rqv5-rqmr
D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20553.
[]
null
null
6.8
null
CVE-2020-4406
IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX) and IBM Spectrum Protect for Space Management 8.1.7.0 through 8.1.9.1 (Linux), 8.1.9.0 through 8.1.9.1 (AIX) web user interfaces could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 179488.
[ "cpe:2.3:a:ibm:spectrum_protect_client:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_protect_for_space_management:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-cwwc-9r7p-wq9x
The Think Mutual Bank Mobile Banking app 3.1.5 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
GHSA-mm38-whqg-h6qc
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35399404. References: QC-CR#1094852.
[]
null
null
7
null
GHSA-j7rh-9v4x-gmm2
Cross-site scripting (XSS) vulnerability in actions/add.php in InTerra Blog Machine 1.84, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the subject parameter to post_url/edit.
[]
null
null
null
null
GHSA-c4x5-wm4g-3cx9
Improper restriction of rendered UI layers or frames issue exists in HMI ViewJet C-more series, which may allow a remote unauthenticated attacker to trick the product user to perform operations on the product's web pages.
[]
null
null
4.3
null
CVE-2023-1871
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:plugin:yourchannel:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-gmwp-vj4h-cq95
In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.
[]
null
3.3
null
null
CVE-2012-3437
The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
[ "cpe:2.3:a:imagemagick:imagemagick:6.7.8-6:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-hmmr-pvfg-gcfv
QMS CrownNet Unix Utilities for 2060 allows root to log on without a password.
[]
null
null
null
null
GHSA-rcf7-7w5q-hqfg
The Git plugin for FusionForge before 6.0rc4 allows remote attackers to execute arbitrary code via an unspecified parameter when creating a secondary Git repository.
[]
null
null
null
null
CVE-2021-37760
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
[ "cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2001-1067
Buffer overflow in AOLserver 3.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via an HTTP request with a long Authorization header.
[ "cpe:2.3:a:aol:aol_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:aol:aol_server:3.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-p8pr-5qmg-85fr
A cross-site request forgery (CSRF) vulnerability in the pjActionUpdate function of PHPJabbers Cinema Booking System v2.0 allows remote attackers to escalate privileges by tricking an authenticated admin into submitting an unauthorized request.
[]
null
5.4
null
null
CVE-2013-2047
The login page (aka index.php) in ownCloud before 5.0.6 does not disable the autocomplete setting for the password parameter, which makes it easier for physically proximate attackers to guess the password.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-hcv8-7fjm-9wh2
Stack-based buffer overflow in the ipv6_addr_from_str function in sys/net/network_layer/ipv6/addr/ipv6_addr_from_str.c in RIOT prior to 2017-04-25 allows local attackers, and potentially remote attackers, to cause a denial of service or possibly have unspecified other impact via a malformed IPv6 address.
[]
null
null
9.8
null
CVE-2019-1179
Windows Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the unistore.dll properly handles objects in memory.
[ "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2024-24622
Softaculous Webuzo Password Reset Command Injection
Softaculous Webuzo contains a command injection in the password reset functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system.
[ "cpe:2.3:a:softaculous:webuzo:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2018-5474
Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.
[ "cpe:2.3:a:philips:intellispace_portal:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:philips:intellispace_portal:9.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
RHSA-2023:0339
Red Hat Security Advisory: sqlite security update
sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
CVE-2024-6945
Flute CMS Avatar Upload Page ImagesController.php unrestricted upload
A vulnerability was found in Flute CMS 0.2.2.4-alpha. It has been classified as critical. This affects an unknown part of the file app/Core/Http/Controllers/Profile/ImagesController.php of the component Avatar Upload Page. The manipulation of the argument avatar leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272067.
[ "cpe:2.3:a:flute:cms:0.2.2.4-alpha:*:*:*:*:*:*:*", "cpe:2.3:a:flute-cms:flute:0.2.2.4:alpha:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-w5qf-7xgv-ggv8
Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[]
6.9
6.1
null
null
CVE-2007-3440
The Snom 320 SIP Phone, running snom320 linux 3.25, snom320-SIP 6.2.3, and snom320 jffs23.36, allows remote attackers to place calls to arbitrary phone numbers via certain requests to the web server on port 1800.
[ "cpe:2.3:o:snom:snom_320_linux:3.25:*:*:*:*:*:*:*", "cpe:2.3:h:snom:320_sip_phone:*:*:*:*:*:*:*:*", "cpe:2.3:h:snom:320_sip_phone:jffs23.36:*:*:*:*:*:*:*", "cpe:2.3:h:snom:320_sip_phone:sip_6.2.3:*:*:*:*:*:*:*" ]
null
null
null
6.4
RHSA-2024:8790
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
GHSA-9rrm-j8h8-3xc5
Unspecified vulnerability in the Oracle Data Mining component for Oracle Database 10g Release 2 10.2.0.2 and 10.2.0.3, 10g 10.1.0.5, and Oracle9i Database Release 2 9.2.0.7, 9.2.0.8, and 9.2.0.8DV has unknown impact and remote authenticated attack vectors related to DMSYS.DMP_SYS, aka DB04.
[]
null
null
null
null
GHSA-gx7w-2wg7-5mcp
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs, Madalin Ungureanu, Antohe Cristian Client Portal – Private user pages and login plugin <= 1.1.8 versions.
[]
null
8.8
null
null
CVE-2021-4143
Cross-site Scripting (XSS) - Generic in bigbluebutton/bigbluebutton
Cross-site Scripting (XSS) - Generic in GitHub repository bigbluebutton/bigbluebutton prior to 2.4.0.
[ "cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*" ]
null
null
8.1
null
GHSA-2v6r-jf2g-j5q5
Cross-site Scripting in Jenkins Rich Text Publisher Plugin
Jenkins Rich Text Publisher Plugin 1.4 and earlier does not escape the HTML message set by its post-build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
[]
null
8
null
null
CVE-2020-5773
Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.
[ "cpe:2.3:o:teltonika-networks:trb245_firmware:00.02.04.01:*:*:*:*:*:*:*", "cpe:2.3:h:teltonika-networks:trb245:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
GHSA-xq3w-v528-46rv
Denial of Service attack on windows app using netty
SummaryAn unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.DetailsWhen the library netty is loaded in a java windows application, the library tries to identify the system environnement in which it is executed.At this stage, Netty tries to load both `/etc/os-release` and `/usr/lib/os-release` even though it is in a Windows environment.If netty finds this files, it reads them and loads them into memory.By default :The JVM maximum memory size is set to 1 GB,A non-privileged user can create a directory at `C:\` and create files within it.the source code identified : https://github.com/netty/netty/blob/4.1/common/src/main/java/io/netty/util/internal/PlatformDependent.javaDespite the implementation of the function `normalizeOs()` the source code not verify the OS before reading `C:\etc\os-release` and `C:\usr\lib\os-release`.PoCCreate a file larger than 1 GB of data in `C:\etc\os-release` or `C:\usr\lib\os-release` on a Windows environnement and start your Netty application.To observe what the application does with the file, the security analyst used "Process Monitor" from the "Windows SysInternals" suite. (https://learn.microsoft.com/en-us/sysinternals/)The source code used is the Netty website code example : [Echo ‐ the very basic client and server](https://netty.io/4.1/xref/io/netty/example/echo/package-summary.html).The vulnerability was tested on the 4.1.112.Final version.The security analyst tried the same technique for `C:\proc\sys\net\core\somaxconn` with a lot of values to impact Netty but the only things that works is the "larger than 1 GB file" technique. https://github.com/netty/netty/blob/c0fdb8e9f8f256990e902fcfffbbe10754d0f3dd/common/src/main/java/io/netty/util/NetUtil.java#L186ImpactBy loading the "file larger than 1 GB" into the memory, the Netty library exceeds the JVM memory limit and causes a crash in the java Windows application.This behaviour occurs 100% of the time in both Server mode and Client mode if the large file exists.Client mode :Server mode :somaxconn :SeverityAttack vector : "Local" because the attacker needs to be on the system where the Netty application is running.Attack complexity : "Low" because the attacker only need to create a massive file (regardless of its contents).Privileges required : "Low" because the attacker requires a user account to exploit the vulnerability.User intercation : "None" because the administrator don't need to accidentally click anywhere to trigger the vulnerability. Furthermore, the exploitation works with defaults windows/AD settings.Scope : "Unchanged" because only Netty is affected by the vulnerability.Confidentiality : "None" because no data is exposed through exploiting the vulnerability.Integrity : "None" because the explotation of the vulnerability does not allow editing, deleting or adding data elsewhere.Availability : "High" because the exploitation of this vulnerability crashes the entire java application.
[]
5.4
5.5
null
null
GHSA-x4r4-hg47-5wwr
NetIQ eDirectory versions prior to 9.0.2, under some circumstances, could be susceptible to downgrade of communication security.
[]
null
null
7.5
null
CVE-2006-2484
Cross-site scripting (XSS) vulnerability in index.html in IceWarp WebMail 5.5.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the PHPSESSID parameter.
[ "cpe:2.3:a:icewarp:web_mail:1.40.00:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:1.40.10:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-x26h-g6hw-673v
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the updateWcWarrantySettings() function in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. Please note this requires the woocommerce-warranty plugin to be installed in order to be exploited.
[]
null
8.8
null
null
GHSA-f756-pwvp-9jmj
Rocket.Chat before 0.74.4, 1.x before 1.3.4, 2.x before 2.4.13, 3.x before 3.7.3, 3.8.x before 3.8.3, and 3.9.x before 3.9.1 mishandles SAML login.
[]
null
null
null
null
CVE-2012-2528
Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; Word Automation Services on Microsoft SharePoint Server 2010; and Office Web Apps 2010 SP1 allows remote attackers to execute arbitrary code via a crafted RTF document, aka "RTF File listid Use-After-Free Vulnerability."
[ "cpe:2.3:a:microsoft:word_automation_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-86v7-vj99-fqvm
In SonarSource SonarQube 10.4 through 10.5 before 10.6, a vulnerability was discovered in the authorizations/group-memberships API endpoint that allows SonarQube users with the administrator role to inject blind SQL commands.
[]
null
6.7
null
null
GHSA-59pj-7mjh-4465
TYPO3 SQL Injection in low-level Query Generator
An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. Because escaping of user-submitted content is mishandled, the class QueryGenerator is vulnerable to SQL injection. Exploitation requires having the system extension ext:lowlevel installed, and a valid backend user who has administrator privileges.
[]
null
null
5.5
null
CVE-2018-14313
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6362.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
PYSEC-2019-27
null
invenio-records before 1.2.2 allows XSS.
[]
null
null
null
null
GHSA-m846-9fcq-992q
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the SetLocalDescription method. By performing actions in JavaScript, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-10972.
[]
null
null
null
null
GHSA-9w68-4r79-85mx
Cross-site scripting (XSS) vulnerability in system_name_set.cgi in TP-Link TL-SG108E 1.0.0 allows authenticated remote attackers to submit arbitrary java script via the 'sysName' parameter.
[]
null
null
5.4
null
GHSA-v3g7-56hc-9f8w
Directory traversal vulnerability in thumbnail.ghp in Easy File Sharing (EFS) Web Server 4.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the vfolder parameter.
[]
null
null
null
null
GHSA-28cx-hxv4-g5q7
Online Car Wash Booking System v1.0 is vulnerable to SQL Injection via /ocwbs/admin/vehicles/manage_vehicle.php?id=.
[]
null
9.8
null
null
GHSA-rc33-44qp-vpvq
Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure
Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.As of publication of this advisory, there is no fix.
[]
null
6.5
null
null
GHSA-pvcv-jjx8-52mj
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in rafasashi SVG Captcha allows Reflected XSS.This issue affects SVG Captcha: from n/a through 1.0.11.
[]
null
7.1
null
null
CVE-2010-1512
Directory traversal vulnerability in aria2 before 1.9.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
[ "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:*:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.2.1\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.2.1\\+2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.3.1\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.3.1\\+2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.5.0\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.5.0\\+2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.6.0\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.10.0\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.10.2\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.1\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.0\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.1\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.1\\+2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.13.2\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.14.0\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.1\\+1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.1\\+2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:0.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.5.0b\\+20090716:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:tatsuhiro_tsujikawa:aria2:1.9.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-20141
Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerabillity
A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms.&nbsp; This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition.
[]
null
7.4
null
null
GHSA-r435-g2mc-22v9
jsish version 2.4.67 contains a CWE-476: NULL Pointer Dereference vulnerability in Jsi_LogMsg (jsiUtils.c:196) that can result in Crash due to segmentation fault. This attack appear to be exploitable via the victim executing specially crafted javascript code. This vulnerability appears to have been fixed in 2.4.69.
[]
null
null
6.5
null
GHSA-3xp7-g5q3-9922
A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.
[]
null
6.3
null
null
CVE-2022-39004
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks.
[ "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-gqjp-rg2w-6r7j
LiveTime/WebObjects/LiveTime.woa/wa/DownloadAction/downloadFile in Micro Focus Novell Service Desk before 7.2 allows remote authenticated users to conduct Hibernate Query Language (HQL) injection attacks and obtain sensitive information via the entityName parameter.
[]
null
null
6.5
null
CVE-2022-39410
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2022-1371
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in ReadRegf. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
[ "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2013-7398
main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
[ "cpe:2.3:a:async-http-client_project:async-http-client:*:beta24:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_fuse:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-54v6-gcmf-jwgg
Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: OXI). The supported version that is affected is 5.6. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. While the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L).
[]
null
7.2
null
null
CVE-2025-31440
WordPress Terms of Use plugin <= 2.0 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Team Terms of Use allows Stored XSS. This issue affects Terms of Use: from n/a through 2.0.
[]
null
7.1
null
null
GHSA-2823-wfgm-j3hr
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
[]
null
null
null
null
CVE-2018-13645
The mintToken function of a smart contract implementation for Fiocoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:fiocoin_project:fiocoin:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-5mv3-qrx8-v8x3
Cross-site scripting (XSS) vulnerability in the tag cloud search script (horde/services/portal/cloud_search.php) in Horde before 3.2.4 and 3.3.3, and Horde Groupware before 1.1.5, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-v583-7m9j-97cw
OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.
[]
null
5.3
null
null
CVE-2008-0987
Stack-based buffer overflow in Image Raw in Apple Mac OS X 10.5.2, and Digital Camera RAW Compatibility before Update 2.0 for Aperture 2 and iPhoto 7.1.2, allows remote attackers to execute arbitrary code via a crafted Adobe Digital Negative (DNG) image.
[ "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:aperture:2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:iphoto:7.1.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-3p86-9955-h393
Arbitrary File Overwrite in Eclipse JGit
Arbitrary File Overwrite in Eclipse JGit <= 6.6.0In Eclipse JGit, all versions <= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem.This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUpdater), pull (PullCommand using merge), and when applying a patch (PatchApplier). This can be exploited for remote code execution (RCE), for instance if the file written outside the working tree is a git filter that gets executed on a subsequent git command.The issue occurs only on case-insensitive filesystems, like the default filesystems on Windows and macOS. The user performing the clone or checkout must have the rights to create symbolic links for the problem to occur, and symbolic links must be enabled in the git configuration.Setting git configuration option core.symlinks = false before checking out avoids the problem.The issue was fixed in Eclipse JGit version 6.6.1.202309021850-r and 6.7.0.202309050840-r, available via Maven Central https://repo1.maven.org/maven2/org/eclipse/jgit/  and repo.eclipse.org https://repo.eclipse.org/content/repositories/jgit-releases/ . A backport is available in 5.13.3 starting from 5.13.3.202401111512-r.The JGit maintainers would like to thank RyotaK for finding and reporting this issue.
[]
null
8.8
null
null
GHSA-mp8r-jgrr-9j4x
OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.
[]
null
null
7.5
null