id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-fmcr-pj8v-2rrp | Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. | []
| null | 3.3 | null | null |
|
CVE-2023-26332 | ZDI-CAN-20144: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-4mrr-j6hj-j39r | Buffer overflow in Snes9x 1.37, when installed setuid root, allows local users to gain root privileges via a long command line argument. | []
| null | null | null | null |
|
GHSA-r58j-7299-f87q | The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace.Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host. | []
| null | 8.4 | null | null |
|
GHSA-fvrq-c69c-wh39 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability. | []
| null | null | 6.3 | null |
|
GHSA-mqhg-vhp9-4f97 | SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the letter parameter in a Search action, a different vector than CVE-2008-2416. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2017-8367 | Buffer overflow in Ether Software Easy MOV Converter 1.4.24, Easy DVD Creator, Easy MPEG/AVI/DIVX/WMV/RM to DVD, Easy Avi/Divx/Xvid to DVD Burner, Easy MPEG to DVD Burner, Easy WMV/ASF/ASX to DVD Burner, Easy RM RMVB to DVD Burner, Easy CD DVD Copy, MP3/AVI/MPEG/WMV/RM to Audio CD Burner, MP3/WAV/OGG/WMA/AC3 to CD Burner, MP3 WAV to CD Burner, My Video Converter, Easy AVI DivX Converter, Easy Video to iPod Converter, Easy Video to PSP Converter, Easy Video to 3GP Converter, Easy Video to MP4 Converter, and Easy Video to iPod/MP4/PSP/3GP Converter allows local attackers to cause a denial of service (SEH overwrite) or possibly have unspecified other impact via a long username. | [
"cpe:2.3:a:ether_software:easy_avi\\/divx\\/xvid_to_dvd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_avi_divx_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_cd_dvd_copy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_dvd_creator:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_mov_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_mov_converter:1.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_mpeg\\/avi\\/divx\\/wmv\\/rm_to_dvd:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_mpeg_to_dvd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_rm_rmvb_to_dvd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_video_to_3gp_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_video_to_ipod\\/mp4\\/psp\\/3gp_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_video_to_ipod_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_video_to_mp4_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_video_to_psp_converter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:easy_wmv\\/asf\\/asx_to_dvd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:mp3\\/avi\\/mpeg\\/wmv\\/rm_to_audio_cd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:mp3\\/wav\\/ogg\\/wma\\/ac3_to_cd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:mp3_wav_to_cd_burner:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ether_software:my_video_converter:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
CVE-2025-25429 | Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page. | []
| null | 4.8 | null | null |
|
GHSA-x2v2-qh6j-j5r3 | SYNEL - eharmony Directory Traversal. Directory Traversal - is an attack against a server or a Web application aimed at unauthorized access to the file system. on the "Name" parameter the attacker can return to the root directory and open the host file. The path exposes sensitive files that users upload | []
| null | null | null | null |
|
GHSA-pc69-wrpv-h7r8 | TYPO3 3.7.1 allows remote attackers to obtain sensitive information via a direct request to (1) thumbs.php, (2) showpic.php, or (3) tables.php, which causes them to incorrectly define a variable and reveal the path in an error message when a require function call fails. | []
| null | null | null | null |
|
CVE-2003-0348 | A certain Microsoft Windows Media Player 9 Series ActiveX control allows remote attackers to view and manipulate the Media Library on the local system via HTML script. | [
"cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
GHSA-wx9v-xq78-r94h | Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice. | []
| null | null | null | null |
|
CVE-2018-5896 | In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, kernel panic may happen due to out-of-bound read, caused by not checking source buffer length against length of packet stream to be copied. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 7.1 | 6.6 |
|
GHSA-wj7f-g5mv-8r59 | Buffer overflow in subsystem in Intel(R) DAL before version 12.0.35 may allow a privileged user to potentially enable escalation of privilege via local access. | []
| null | null | 6.7 | null |
|
CVE-2005-0560 | Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port. | [
"cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2003:-:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2012:0410 | Red Hat Security Advisory: raptor security update | raptor: XML External Entity (XXE) attack via RDF files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2023-6877 | The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.3.3 due to insufficient input sanitization and output escaping on the Content-Type field of error messages when retrieving an invalid RSS feed. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
RHSA-2023:7587 | Red Hat Security Advisory: Updated IBM Business Automation Manager Open Editions 8.0.4 SP1 Images | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhosemc:1.0::el8"
]
| null | 7.5 | null | null |
CVE-2023-6977 | Path Traversal: '\..\filename' | This vulnerability enables malicious users to read sensitive files on the server. | [
"cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*"
]
| null | null | 10 | null |
GHSA-r93j-cm86-gfc2 | Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View. | []
| null | 7.8 | null | null |
|
GHSA-36qp-p5p2-rm5x | Multiple PHP remote file inclusion vulnerabilities in Rhode Island Open Meetings Filing Application (OMFA) allow remote attackers to execute arbitrary PHP code via a URL in the PROJECT_ROOT parameter to (1) editmeetings/session.php, (2) email/session.php, (3) entityproperties/session.php, or (4) inc/mail.php. | []
| null | null | null | null |
|
CVE-2021-36316 | Dell EMC Avamar Server versions 18.2, 19.1, 19.2, 19.3, and 19.4 contain an improper privilege management vulnerability in AUI. A malicious user with high privileges could potentially exploit this vulnerability, leading to the disclosure of the AUI info and performing some unauthorized operation on the AUI. | [
"cpe:2.3:a:dell:emc_avamar_server:18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.4:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
GHSA-4pjg-hm2r-rj25 | The username command in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers and Cisco ACE 4710 Application Control Engine Appliance stores a cleartext password by default, which allows context-dependent attackers to obtain sensitive information. | []
| null | null | null | null |
|
RHSA-2023:6021 | Red Hat Security Advisory: varnish:6 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.5 | null | null |
GHSA-9cwv-cppx-mqjm | Improper Authentication in Capsule Proxy | ImpactUsing a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.PatchesPatch has been merged in the v0.2.1 release.WorkaroundsUpgrading is mandatory. | []
| null | 8.8 | null | null |
CVE-2022-35278 | HTML Injection in ActiveMQ Artemis Web Console | In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue. | [
"cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
CVE-2024-5708 | WPBakery <= 7.7 - Authenticated (Author+) Stored Cross-Site Scripting | The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 7.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
GHSA-qgrf-34hp-ghm9 | OpenCart Path Traversal | OpenCart through 3.0.2.0 allows directory traversal in the `editDownload` function in `admin\model\catalog\download.php` via `admin/index.php?route=catalog/download/edit`, related to the `download_id`. For example, an attacker can download `../../config.php`. | []
| null | null | 4.9 | null |
CVE-2020-3738 | Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2018-14950 | The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack. | [
"cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2024-10693 | SKT Addons for Elementor <= 3.3 - Authenticated (Contributor+) Post Disclosure | The SKT Addons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.3 via the Unfold widget due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. | []
| null | 4.3 | null | null |
GHSA-p2mj-x9rf-q85j | musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query. | []
| null | null | 7.5 | null |
|
CVE-2023-1712 | Use of Hard-coded, Security-relevant Constants in deepset-ai/haystack | Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30. | [
"cpe:2.3:a:deepset:haystack:*:*:*:*:*:*:*:*"
]
| null | null | 9.1 | null |
CVE-2015-8275 | LVRTC eParakstitajs 3.0 (1.3.0) and edoc-libraries-2.5.4_01 allow attackers to write to arbitrary files via crafted EDOC files. | [
"cpe:2.3:a:eparaksts:edoc-libraries:2.5.4_01:*:*:*:*:*:*:*",
"cpe:2.3:a:eparaksts:eparakstitajs_3:1.3.0:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
RHSA-2013:0130 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-77hq-crr3-x6hc | In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: Fix DSP oops stack dump output contentsFix @buf arg given to hex_dump_to_buffer() and stack address used
in dump error output. | []
| null | null | null | null |
|
GHSA-wm2c-w847-j6cr | CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689. | []
| null | null | null | null |
|
CVE-2009-3914 | Cross-site scripting (XSS) vulnerability in the Temporary Invitation module 5.x before 5.x-2.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via the Name field in an invitation. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-c929-49h9-7vjw | Offline Explorer 1.4 before Service Release 2 allows remote attackers to read arbitrary files by specifying the drive letter (e.g. C:) in the requested URL. | []
| null | null | null | null |
|
GHSA-7f4p-87qm-rj6c | In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username. | []
| null | null | 9.8 | null |
|
GHSA-mjc2-q8fc-rhrm | Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the timeType function at /goform/SetSysTimeCfg. | []
| null | 9.8 | null | null |
|
GHSA-jr7w-rv7x-x733 | Picserver web server allows remote attackers to read arbitrary files via a .. (dot dot) attack in an HTTP GET request. | []
| null | null | null | null |
|
GHSA-p7pw-3rg9-hpxm | There is a command injection vulnerability that may allow an attacker to inject malicious input on the device's operating system. | []
| null | 8.8 | null | null |
|
RHSA-2014:0189 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
]
| null | null | null | null |
CVE-2007-0360 | PHP remote file inclusion vulnerability in lang/index.php in Oreon 1.2.3 RC4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the file parameter. | [
"cpe:2.3:a:oreon_project:oreon:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-hvxg-77mg-vrvp | Mattermost Desktop App Remote Code Execution | Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system via custom URI schemes. | []
| null | 4.7 | null | null |
RHSA-2019:0364 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update | wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
]
| null | null | 5.3 | null |
CVE-2007-4952 | SQL injection vulnerability in article.php in OmniStar Article Manager allows remote attackers to execute arbitrary SQL commands via the page_id parameter in a favorite op action, a different vector than CVE-2006-5917. | [
"cpe:2.3:a:omnistar_interactive:omnistar_article_manager:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2025-37873 | eth: bnxt: fix missing ring index trim on error path | In the Linux kernel, the following vulnerability has been resolved:
eth: bnxt: fix missing ring index trim on error path
Commit under Fixes converted tx_prod to be free running but missed
masking it on the Tx error path. This crashes on error conditions,
for example when DMA mapping fails. | []
| null | null | null | null |
CVE-2024-27443 | An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code. | [
"cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
CVE-2008-6754 | The Personal Sticky Threads addon 1.0.3c for vBulletin allows remote authenticated users to read the title, author, and pages of an arbitrary thread by toggling a personal sticky. | [
"cpe:2.3:a:jelsoft:vbulletin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mephisteus:the_personal_sticky_threads:1.0.3c:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-4qc2-r4q6-vfxr | diag_tool.cgi on DASAN H660RM GPON routers with firmware 1.03-0022 lacks any authorization check, which allows remote attackers to run a ping command via a GET request to enumerate LAN devices or crash the router with a DoS attack. | []
| null | null | 9.1 | null |
|
RHBA-2021:2703 | Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform Product Release | ansible: Template Injection through yaml multi-line strings with ansible facts used in template. | [
"cpe:/a:redhat:ansible_automation_platform:2.0::el8"
]
| null | 6.6 | null | null |
RHSA-2020:2513 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
]
| null | 6.5 | 8.1 | null |
GHSA-4hrr-7cq5-fj96 | tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes. | []
| null | null | null | null |
|
CVE-2005-2637 | Multiple SQL injection vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Match or (2) CatID parameter to SearchResults.php, or (3) the password to AccessControl.php. | [
"cpe:2.3:a:phpfreenews:phpfreenews:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2007-0607 | W-Agora (Web-Agora) 4.2.1, when register_globals is enabled, stores globals.inc under the web document root with insufficient access control, which allows remote attackers to obtain application path information via a direct request. | [
"cpe:2.3:a:w-agora:w-agora:4.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-rr4m-8whr-q39q | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | []
| null | null | null | null |
|
GHSA-3mf4-grcw-4c92 | The ExecuteExe method in the DVBSExeCall Control ActiveX control 1.0.0.1 in DVBSExeCall.ocx in DATEV Base System (aka Grundpaket Basis) allows remote attackers to execute arbitrary commands via unspecified vectors. | []
| null | null | null | null |
|
GHSA-5gqw-f2qg-w3vf | In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks. | []
| null | null | null | null |
|
GHSA-q82x-fpcf-f854 | KNIME Server before 4.13.4 allows directory traversal in a request for a client profile. | []
| null | 7.5 | null | null |
|
CVE-2000-0787 | IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser. | [
"cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xchat:xchat:1.5.xdev:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-47517 | An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error. | [
"cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-7hv5-hxph-jxm3 | Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | 9.8 | null |
|
GHSA-gq65-xxmf-mf89 | Cross-site request forgery (CSRF) vulnerability in Related YouTube Videos versions prior to 1.9.9 allows remote attackers to hijack the authentication of administrators via unspecified vectors. | []
| null | 8.8 | null | null |
|
CVE-2025-6874 | SourceCodester Best Salon Management System add_subscribe.php sql injection | A vulnerability, which was classified as critical, was found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/add_subscribe.php. The manipulation of the argument user_id/plan_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-2j48-mrqm-r4w9 | CimWebServer in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY 4.01 through 8.0, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary commands or cause a denial of service (daemon crash) via a crafted packet. | []
| null | null | null | null |
|
GHSA-cmp3-q2f2-v785 | Cross-Site Request Forgery (CSRF) vulnerability in weblizar HR Management Lite allows Cross Site Request Forgery. This issue affects HR Management Lite: from n/a through 3.3. | []
| null | 4.3 | null | null |
|
CVE-2021-37759 | A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID). | [
"cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-p6r9-p725-g42c | The unprivileged administrative interface in ABO.CMS version 5.8 through v.5.9.3 is affected by a SQL Injection vulnerability via a HTTP POST request to the TinyMCE module | []
| null | 6.5 | null | null |
|
RHBA-2023:1037 | Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update | openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions | [
"cpe:/a:redhat:openshift:4.12::el8"
]
| null | 6.3 | null | null |
CVE-2025-0952 | Eco Nature - Environment & Ecology WordPress Theme <= 2.0.4 - Missing Authorization to Authenticated (Subscriber+) Limited Options Update | The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration. | []
| null | 8.1 | null | null |
CVE-2024-49086 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-76g7-7jq2-pjg7 | TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister. | []
| null | 9.8 | null | null |
|
CVE-2021-29562 | CHECK-fail in `tf.raw_ops.IRFFT` | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.IRFFT`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
]
| null | 2.5 | null | null |
GHSA-cfr6-fjfx-m5r2 | An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings. | []
| null | 9.8 | null | null |
|
CVE-2024-28710 | Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's message component. | [
"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-2jhj-4276-cq8h | An issue was discovered in the Vanguard plugin 2.1 for WordPress. XSS can occur via the mails/new title field, a product field to the p/ URI, or the Products Search box. | []
| null | null | null | null |
|
RHSA-2024:11237 | Red Hat Security Advisory: libsndfile:1.0.31 security update | libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 5.5 | null | null |
CVE-2023-43766 | Certain WithSecure products allow Local privilege escalation via the lhz archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | [
"cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-6cvr-wmr3-636f | Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI. | []
| null | 7.5 | null | null |
|
GHSA-69p2-c4f9-v6j4 | The WP Contact Form7 Email Spam Blocker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
|
CVE-2024-47435 | Substance3D - Painter | Out-of-bounds Read (CWE-125) | Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-cm69-2c6j-6pvp | A remote cross-site request forgery (csrf) vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.8.0.1, 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.15. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability. | []
| null | null | null | null |
|
CVE-2018-6368 | SQL Injection exists in the JomEstate PRO through 3.7 component for Joomla! via the id parameter in a task=detailed action. | [
"cpe:2.3:a:comdev:jomestate_pro:*:*:*:*:*:joomla\\!:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-3g5p-5p6j-r9qp | In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 7.4 | null | null |
|
GHSA-97pg-mf6p-74fr | Multiple PHP remote file inclusion vulnerabilities in phpMyAdmin 2.6.1 allow remote attackers to execute arbitrary PHP code by modifying the (1) theme parameter to phpmyadmin.css.php or (2) cfg[Server][extension] parameter to database_interface.lib.php to reference a URL on a remote web server that contains the code. | []
| null | null | null | null |
|
CVE-2023-1223 | Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
|
GHSA-34vx-3926-gfg8 | IBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 as well as IBM Rational Team Concert 6.0.6 and 6.0.6.1 could allow an authneticated attacker to obtain sensitive information from build definitions that could aid in further attacks against the system. IBM X-Force ID: 200657. | []
| null | 4.3 | null | null |
|
CVE-2023-49589 | An insufficient entropy vulnerability exists in the userRecoverPass.php recoverPass generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to an arbitrary user password recovery. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:a:wwbn:avideo:15fed957fb:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2018-0040 | Contrail Service Orchestration: hardcoded cryptographic certificates and keys | Juniper Networks Contrail Service Orchestrator versions prior to 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based attackers to gain unauthorized access to services. | [
"cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | null |
CVE-2024-39723 | IBM FlashSystem denial of service | IBM FlashSystem 5300 USB ports may be usable even if the port has been disabled by the administrator. A user with physical access to the system could use the USB port to cause loss of access to data. IBM X-Force ID: 295935. | [
"cpe:2.3:a:ibm:storage_virtualize:8.6:*:*:*:*:*:*:*"
]
| null | 4.6 | null | null |
GHSA-qxrr-6vvc-2mcc | Buffer underflow in ssldump 0.9b2 and earlier allows remote attackers to cause a denial of service (memory corruption) via a crafted SSLv2 challenge value. | []
| null | null | null | null |
|
GHSA-3w7f-3j97-hfv4 | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to store malicious javascript code in the device and trigger it via crafted HTTP requests | []
| null | null | null | null |
|
RHSA-2023:3382 | Red Hat Security Advisory: git security update | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 7.8 | null | null |
CVE-2024-33660 | Potential Firmware update without integrity check | An exploit is possible where an actor with physical access can manipulate SPI flash without being detected. | []
| 5.2 | null | null | null |
RHSA-2022:0856 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.11 security updates and bug fixes | object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
]
| null | 6.5 | null | null |
CVE-2006-4900 | Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function. | [
"cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*"
]
| null | null | null | 5.5 |
|
CVE-2022-23626 | Insufficient file checks in m1k1o/blog | m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. | [
"cpe:2.3:a:blog_project:blog:*:*:*:*:*:*:*:*"
]
| null | 8.5 | null | null |
GHSA-3gph-8868-xm4r | SearchBlox before Version 9.2.1 is vulnerable to Privileged Escalation-Lower user is able to access Admin functionality. | []
| null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.