id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-23279
Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2017-7171
An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "CoreAnimation" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2020-15425
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9742.
[ "cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-4rcf-8m6c-xh78
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
[]
null
6.5
null
null
GHSA-9pj7-4fqw-mqwq
Unknown vulnerability in Sun Java Runtime Environment (JRE) 1.4.2 through 1.4.2_03 allows remote attackers to cause a denial of service (virtual machine hang).
[]
null
null
null
null
CVE-2022-49505
NFC: NULL out the dev->rfkill to prevent UAF
In the Linux kernel, the following vulnerability has been resolved: NFC: NULL out the dev->rfkill to prevent UAF Commit 3e3b5dfcd16a ("NFC: reorder the logic in nfc_{un,}register_device") assumes the device_is_registered() in function nfc_dev_up() will help to check when the rfkill is unregistered. However, this check only take effect when device_del(&dev->dev) is done in nfc_unregister_device(). Hence, the rfkill object is still possible be dereferenced. The crash trace in latest kernel (5.18-rc2): [ 68.760105] ================================================================== [ 68.760330] BUG: KASAN: use-after-free in __lock_acquire+0x3ec1/0x6750 [ 68.760756] Read of size 8 at addr ffff888009c93018 by task fuzz/313 [ 68.760756] [ 68.760756] CPU: 0 PID: 313 Comm: fuzz Not tainted 5.18.0-rc2 #4 [ 68.760756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 68.760756] Call Trace: [ 68.760756] <TASK> [ 68.760756] dump_stack_lvl+0x57/0x7d [ 68.760756] print_report.cold+0x5e/0x5db [ 68.760756] ? __lock_acquire+0x3ec1/0x6750 [ 68.760756] kasan_report+0xbe/0x1c0 [ 68.760756] ? __lock_acquire+0x3ec1/0x6750 [ 68.760756] __lock_acquire+0x3ec1/0x6750 [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 68.760756] ? register_lock_class+0x18d0/0x18d0 [ 68.760756] lock_acquire+0x1ac/0x4f0 [ 68.760756] ? rfkill_blocked+0xe/0x60 [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 68.760756] ? mutex_lock_io_nested+0x12c0/0x12c0 [ 68.760756] ? nla_get_range_signed+0x540/0x540 [ 68.760756] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 68.760756] _raw_spin_lock_irqsave+0x39/0x50 [ 68.760756] ? rfkill_blocked+0xe/0x60 [ 68.760756] rfkill_blocked+0xe/0x60 [ 68.760756] nfc_dev_up+0x84/0x260 [ 68.760756] nfc_genl_dev_up+0x90/0xe0 [ 68.760756] genl_family_rcv_msg_doit+0x1f4/0x2f0 [ 68.760756] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x230/0x230 [ 68.760756] ? security_capable+0x51/0x90 [ 68.760756] genl_rcv_msg+0x280/0x500 [ 68.760756] ? genl_get_cmd+0x3c0/0x3c0 [ 68.760756] ? lock_acquire+0x1ac/0x4f0 [ 68.760756] ? nfc_genl_dev_down+0xe0/0xe0 [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 68.760756] netlink_rcv_skb+0x11b/0x340 [ 68.760756] ? genl_get_cmd+0x3c0/0x3c0 [ 68.760756] ? netlink_ack+0x9c0/0x9c0 [ 68.760756] ? netlink_deliver_tap+0x136/0xb00 [ 68.760756] genl_rcv+0x1f/0x30 [ 68.760756] netlink_unicast+0x430/0x710 [ 68.760756] ? memset+0x20/0x40 [ 68.760756] ? netlink_attachskb+0x740/0x740 [ 68.760756] ? __build_skb_around+0x1f4/0x2a0 [ 68.760756] netlink_sendmsg+0x75d/0xc00 [ 68.760756] ? netlink_unicast+0x710/0x710 [ 68.760756] ? netlink_unicast+0x710/0x710 [ 68.760756] sock_sendmsg+0xdf/0x110 [ 68.760756] __sys_sendto+0x19e/0x270 [ 68.760756] ? __ia32_sys_getpeername+0xa0/0xa0 [ 68.760756] ? fd_install+0x178/0x4c0 [ 68.760756] ? fd_install+0x195/0x4c0 [ 68.760756] ? kernel_fpu_begin_mask+0x1c0/0x1c0 [ 68.760756] __x64_sys_sendto+0xd8/0x1b0 [ 68.760756] ? lockdep_hardirqs_on+0xbf/0x130 [ 68.760756] ? syscall_enter_from_user_mode+0x1d/0x50 [ 68.760756] do_syscall_64+0x3b/0x90 [ 68.760756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.760756] RIP: 0033:0x7f67fb50e6b3 ... [ 68.760756] RSP: 002b:00007f67fa91fe90 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 68.760756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f67fb50e6b3 [ 68.760756] RDX: 000000000000001c RSI: 0000559354603090 RDI: 0000000000000003 [ 68.760756] RBP: 00007f67fa91ff00 R08: 00007f67fa91fedc R09: 000000000000000c [ 68.760756] R10: 0000000000000000 R11: 0000000000000293 R12: 00007ffe824d496e [ 68.760756] R13: 00007ffe824d496f R14: 00007f67fa120000 R15: 0000000000000003 [ 68.760756] </TASK> [ 68.760756] [ 68.760756] Allocated by task 279: [ 68.760756] kasan_save_stack+0x1e/0x40 [ ---truncated---
[]
null
7.8
null
null
GHSA-694m-q83p-4954
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the First Name or Last Name field on staff/register.php.
[]
null
null
null
null
GHSA-px44-7553-qmv8
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /view/student_payment_details3.php. The manipulation of the argument month leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263129 was assigned to this vulnerability.
[]
null
3.5
null
null
CVE-2004-0810
Buffer overflow in Netopia Timbuktu 7.0.3 allows remote attackers to cause a denial of service (server process crash) via a certain data string that is sent to multiple simultaneous client connections to TCP port 407.
[ "cpe:2.3:a:netopia:timbuktu_pro_mac:6.0.1:*:*:*:*:*:*:*" ]
null
null
null
5
cisco-sa-uipphone-xss-NcmUykqA
Cisco IP Phone Stored Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of a small subset of Cisco IP Phones could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.5
null
null
GHSA-g6pv-jvqw-865r
The default configuration of the web server in IBM Lotus Domino Server, possibly 6.0 through 8.0, enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398.
[]
null
null
null
null
GHSA-jw64-xwgf-cfcc
Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle One-to-One Fulfillment accessible data as well as unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
null
null
GHSA-qhpq-8fgc-6f72
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
[]
null
null
5.5
null
CVE-2012-0980
SQL injection vulnerability in download.php in phux Download Manager allows remote attackers to execute arbitrary SQL commands via the file parameter.
[ "cpe:2.3:a:phux:download_manager:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-h937-x287-5g89
A vulnerability in the implementation of Point-to-Point Tunneling Protocol (PPTP) functionality in Cisco Aironet 1810, 1830, and 1850 Series Access Points could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected access point. An attacker could exploit this vulnerability by initiating a PPTP connection to an affected access point from a device that is registered to the same wireless network as the access point and sending a malicious GRE frame through the data plane of the access point. A successful exploit could allow the attacker to cause the NSS core process on the affected access point to crash, which would cause the access point to reload and result in a DoS condition. This vulnerability affects Cisco Aironet 1810, 1830, and 1850 Series Access Points that are running Cisco Mobility Express Software Release 8.4.100.0, 8.5.103.0, or 8.5.105.0 and are configured as a master, subordinate, or standalone access point. Cisco Bug IDs: CSCvf73890.
[]
null
null
8.6
null
CVE-2007-0149
EMembersPro 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for users.mdb.
[ "cpe:2.3:a:ememberspro:ememberspro:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-43961
In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser.
[]
null
2.9
null
null
GHSA-wfpg-gw9j-p5g3
14all.cgi 1.1p15 in mrtgconfig allows remote attackers to determine the physical path to the web root directory via a request with an invalid cfg parameter, which generates an error message that reveals the path.
[]
null
null
null
null
CVE-2020-27232
An exploitable SQL injection vulnerability exists in ‘manageServiceStocks.jsp’ page of OpenClinic GA 5.173.3. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.173.3:*:*:*:*:*:*:*" ]
null
null
6.4
null
GHSA-2cjx-f7xp-2h42
Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267.
[]
null
null
null
null
GHSA-2c7m-3xrp-8qgf
In all Qualcomm products with Android releases from CAF using the Linux kernel, an argument to a mink syscall is not properly validated.
[]
null
null
9.8
null
GHSA-34f3-7q4m-qjx4
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
[]
null
null
null
null
GHSA-f238-42hq-gm36
The Meow Gallery WordPress plugin before 4.1.9 does not sanitise, validate or escape the ids attribute of its gallery shortcode (available for users as low as Contributor) before using it in an SQL statement, leading to an authenticated SQL Injection issue. The injection also allows the returned values to be manipulated in a way that could lead to data disclosure and arbitrary objects to be deserialized.
[]
null
null
null
null
RHSA-2021:0306
Red Hat Security Advisory: flatpak security update
flatpak: sandbox escape via spawn portal
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
GHSA-m96w-m23v-g6p2
A vulnerability, which was classified as problematic, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This affects an unknown part of the file register_case.php. The manipulation of the argument title/description/opposite_lawyer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
3.5
null
null
RHSA-2024:0495
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9.SP1 release and security update
quarkus: Authorization flaw in Quarkus RestEasy Reactive and Classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used. quarkus: json payload getting processed prior to security checks when rest resources are used with annotations.
[ "cpe:/a:redhat:quarkus:3.2::el8" ]
null
8.6
null
null
GHSA-p3xg-2r2p-7rm4
In the Linux kernel, the following vulnerability has been resolved:media: ar0521: don't overflow when checking PLL valuesThe PLL checks are comparing 64 bit integers with 32 bit ones, as reported by Coverity. Depending on the values of the variables, this may underflow.Fix it ensuring that both sides of the expression are u64.
[]
null
5.5
null
null
GHSA-x9c4-g4mc-7433
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
[]
null
null
6.7
null
GHSA-jfvv-8342-x746
A vulnerability has been identified in RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0). The web server of the affected systems leaks the MACSEC key in clear text to a logged in user. An attacker with the credentials of a low privileged user could retrieve the MACSEC key and access (decrypt) the ethernet frames sent by authorized recipients.
[]
2.3
4.3
null
null
GHSA-qfmr-r878-mwrw
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
[]
null
null
8.1
null
GHSA-c6h2-xp45-96cv
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
[]
null
6.5
null
null
CVE-2000-0074
PowerScripts PlusMail CGI program allows remote attackers to execute commands via a password file with improper permissions.
[ "cpe:2.3:a:powerscripts:plusmail:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-43736
CmsWing CMS 1.3.7 is affected by a Remote Code Execution (RCE) vulnerability via parameter: log rule
[ "cpe:2.3:a:cmswing:cmswing:1.3.7:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-56799
Simofa Allows Unauthenticated Access to API Routes
Simofa is a tool to help automate static website building and deployment. Prior to version 0.2.7, due to a design mistake in the RouteLoader class, some API routes may be publicly accessible when they should require authentication. This vulnerability has been patched in v0.2.7.
[]
null
10
null
null
CVE-2011-3599
The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
[ "cpe:2.3:a:adam_kennedy:crypt-dsa:*:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.01:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.02:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.03:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.12:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.13:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.14:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:0.15_01:*:*:*:*:*:*:*", "cpe:2.3:a:adam_kennedy:crypt-dsa:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*" ]
null
null
null
5.8
RHSA-2024:1203
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.1 security update
kubernetes: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.8
null
null
GHSA-hjcx-6r9f-f974
In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible
[]
null
7.7
null
null
GHSA-r4m7-9275-xfg3
Improper access control in some Intel(R) DSA software before version 23.4.33 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
CVE-2010-0907
Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0898, CVE-2010-0899, CVE-2010-0904, and CVE-2010-0906.
[ "cpe:2.3:a:oracle:secure_backup:10.3.0.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-rc7m-7858-33xm
Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
GHSA-76qm-79wf-9cx5
The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.5.4.8 via the 'tickera_tickets_info' endpoint. This makes it possible for unauthenticated attackers to extract sensitive data from bookings like full names, email addresses, check-in/out timestamps and more.
[]
null
5.3
null
null
RHSA-2005:017
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
CVE-2022-4592
luckyshot CRMx index.php commentdelete sql injection
A vulnerability was found in luckyshot CRMx and classified as critical. This issue affects the function get/save/delete/comment/commentdelete of the file index.php. The manipulation leads to sql injection. The attack may be initiated remotely. The name of the patch is 8c62d274986137d6a1d06958a6f75c3553f45f8f. It is recommended to apply a patch to fix this issue. The identifier VDB-216185 was assigned to this vulnerability.
[ "cpe:2.3:a:crmx_project:crmx:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-fmpc-hppj-v479
NVIDIA driver contains a possible out-of-bounds read vulnerability due to a leak which may lead to information disclosure. This issue is rated as moderate. Android: A-63851980.
[]
null
null
7.5
null
GHSA-xjf7-7f5m-qhq8
A buffer overflow was reported in the ReFlash module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
[]
null
6.7
null
null
RHSA-2013:0261
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
jbossws: Prone to character encoding pattern attack (XML Encryption flaw)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10" ]
null
null
null
null
CVE-2023-4760
Remote Code Execution in Eclipse RAP on Windows
In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.
[ "cpe:2.3:a:eclipse:remote_application_platform:*:*:*:*:*:*:*:*" ]
null
7.6
null
null
GHSA-4q7x-mgpp-gv6h
The Geo Controller plugin for WordPress is vulnerable to unauthorized shortcode execution due to missing authorization and capability checks on the ajax__shortcode_cache function in all versions up to, and including, 8.6.9. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes available on the target site.
[]
null
5.3
null
null
GHSA-r5hf-jqxq-23g7
Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.
[]
null
8.8
null
null
GHSA-c83w-gq93-g5pw
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
[]
null
4
null
null
CVE-2009-4955
SQL injection vulnerability in the ultraCards (th_ultracards) extension before 0.5.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:thomas_hempel:th_ultracards:*:*:*:*:*:*:*:*", "cpe:2.3:a:thomas_hempel:th_ultracards:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:thomas_hempel:th_ultracards:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:thomas_hempel:th_ultracards:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:thomas_hempel:th_ultracards:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-969g-rq57-c79h
Disabled permissions can be granted by Folder-based in Jenkins Authorization Strategy Plugin
Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to.
[]
null
6.8
null
null
CVE-2022-0339
Server-Side Request Forgery (SSRF) in janeczku/calibre-web
Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.
[ "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-4f5x-q4jc-xfcf
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
[]
null
null
6.6
null
CVE-2017-1668
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 133562.
[ "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0.2:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
CVE-2023-5178
Kernel: use after free in nvmet_tcp_free_crypto in nvme
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*", "cpe:/a:redhat:enterprise_linux:8::realtime", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:9" ]
null
8.8
null
null
GHSA-99f8-q57f-c8x4
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4.0, 10.0.2.0, 10.3.3.0, 10.3.4.0, and 10.3.5.0 allows remote attackers to affect confidentiality via unknown vectors related to Web Services.
[]
null
null
null
null
CVE-2023-48655
An issue was discovered in MISP before 2.4.176. app/Controller/Component/IndexFilterComponent.php does not properly filter out query parameters.
[ "cpe:2.3:a:misp-project:malware_information_sharing_platform:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2002-1600
Directory traversal vulnerability in Mike Spice's My Classifieds (classifieds.cgi) before 1.3 allows remote attackers to overwrite arbitrary files via the category parameter.
[ "cpe:2.3:a:mike_spice:my_classifieds:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mike_spice:my_classifieds:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mike_spice:my_classifieds:1.2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2005-1664
The __VIEWSTATE functionality in Microsoft ASP.NET 1.x allows remote attackers to conduct replay attacks to (1) apply a ViewState generated from one view to a different view, (2) reuse ViewState information after the application's state has changed, or (3) use the ViewState to conduct attacks or expose content to third parties.
[ "cpe:2.3:a:microsoft:asp.net:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:asp.net:1.1:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-4x8f-h58h-jh6h
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
[]
null
6.1
null
null
CVE-2022-49897
fscrypt: fix keyring memory leak on mount failure
In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure Commit d7e7b9af104c ("fscrypt: stop using keyrings subsystem for fscrypt_master_key") moved the keyring destruction from __put_super() to generic_shutdown_super() so that the filesystem's block device(s) are still available. Unfortunately, this causes a memory leak in the case where a mount is attempted with the test_dummy_encryption mount option, but the mount fails after the option has already been processed. To fix this, attempt the keyring destruction in both places.
[]
null
null
null
null
RHSA-2020:2529
Red Hat Security Advisory: tomcat6 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7
null
null
GHSA-j6mw-3p6q-wxcc
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
[]
null
6.6
null
null
CVE-2008-3717
Harmoni before 1.6.0 does not require administrative privileges to list (1) user names or (2) asset ids, which allows remote attackers to obtain sensitive information.
[ "cpe:2.3:a:harmoni:harmoni:*:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:0.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:harmoni:harmoni:1.4.6:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-1474
SourceCodester Automatic Question Paper Generator System GET Parameter manage_question_paper.php sql injection
A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file users/question_papers/manage_question_paper.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223336.
[ "cpe:2.3:a:automatic_question_paper_generator_system_project:automatic_question_paper_generator_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-hghj-5mwm-2xgv
The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.
[]
null
null
7.8
null
CVE-2018-16362
An issue was discovered in the Source Integration plugin before 1.5.9 and 2.x before 2.1.5 for MantisBT. A cross-site scripting (XSS) vulnerability in the Manage Repository and Changesets List pages allows execution of arbitrary code (if CSP settings permit it) via repo_manage_page.php or list.php.
[ "cpe:2.3:a:mantisbt:source_integration:*:*:*:*:*:mantisbt:*:*" ]
null
6.1
null
4.3
GHSA-5hjr-8g97-mrgc
Unrestricted Upload of File with Dangerous Type vulnerability in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager.This issue affects Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager: from n/a through 2.9.2.
[]
null
9.1
null
null
GHSA-5jqh-v34h-7q6v
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.
[]
null
null
null
null
CVE-2012-4265
SQL injection vulnerability in category_edit.php in Proman Xpress 5.0.1 allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[ "cpe:2.3:a:itechscripts:proman_xpress:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-0368
Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
[ "cpe:2.3:a:oracle:jdk:1.5.0:update55:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update55:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*" ]
null
null
null
5
GHSA-r6gq-v4qj-57vc
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Others). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
8.2
null
null