id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
ICSA-24-284-08 | Siemens HiMed Cockpit | The Kiosk Mode of the affected devices contains a restricted desktop environment escape vulnerability. This could allow an unauthenticated local attacker to escape the restricted environment and gain access to the underlying operating system. | []
| null | 8.5 | null | null |
GHSA-j867-w6rm-vgp2 | The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash). | []
| null | null | null | null |
|
CVE-2022-27772 | spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer | [
"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2022-25804 | An issue was discovered in the IGEL Universal Management Suite (UMS) 6.07.100. Insecure permissions for the serverconfig registry key (under JavaSoft\Prefs\de\igel\rm\config in HKEY_LOCAL_MACHINE\SOFTWARE) allow an unprivileged local attacker to read the encrypted dbuser and dbpassword values for the UMS superuser. | [
"cpe:2.3:a:igel:universal_management_suite:6.07.100:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-fg8c-8f5r-r5m9 | A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations. | []
| null | 6.5 | null | null |
|
GHSA-c592-6f6m-vm4h | Missing Authorization vulnerability in AIpost AI WP Writer.This issue affects AI WP Writer: from n/a through 3.6.5. | []
| null | 5.3 | null | null |
|
RHSA-2023:5951 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.3.8 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:service_mesh:2.3::el8"
]
| null | 7.5 | null | null |
GHSA-9h7j-p9x5-m3h2 | Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20391. | []
| null | null | 7.8 | null |
|
CVE-2023-0410 | Cross-site Scripting (XSS) - Generic in builderio/qwik | Cross-site Scripting (XSS) - Generic in GitHub repository builderio/qwik prior to 0.1.0-beta5. | [
"cpe:2.3:a:builder:qwik:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
CVE-2005-2788 | Multiple SQL injection vulnerabilities in Land Down Under (LDU) 801 and earlier allow remote attackers to execute arbitrary SQL commands via the c parameter to (1) events.php, (2) index.php, or (3) list.php. | [
"cpe:2.3:a:neocrome:land_down_under:700.01:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.02:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.03:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.04:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.05:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:701:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:800:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:801:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-mgc8-86f4-wh2w | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Enea Overclokk Advanced Control Manager for WordPress by ItalyStrap allows Reflected XSS.This issue affects Advanced Control Manager for WordPress by ItalyStrap: from n/a through 2.16.0. | []
| null | 7.1 | null | null |
|
GHSA-f7h2-45vx-j468 | ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls. | []
| null | null | 6.5 | null |
|
CVE-2019-14343 | TemaTres 3.0 has stored XSS via the value parameter to the vocab/admin.php?vocabulario_id=list URI. | [
"cpe:2.3:a:vocabularyserver:tematres:3.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-8wxh-5wv6-x378 | A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. | []
| null | 6.5 | null | null |
|
GHSA-xc2r-2r8h-fqw9 | NUUO NVRmini 2 1.0.0 through 3.0.0 and NUUO NVRsolo 1.0.0 through 3.0.0 have hardcoded root credentials, which allows remote attackers to obtain administrative access via unspecified vectors. | []
| null | null | 9.8 | null |
|
GHSA-q8gr-rr8w-mwmq | An issue was discovered in Ignite Realtime Spark 2.8.3 (and the ROAR plugin for it) on Windows. A chat message can include an IMG element with a SRC attribute referencing an external host's IP address. Upon access to this external host, the (NT)LM hashes of the user are sent with the HTTP request. This allows an attacker to collect these hashes, crack them, and potentially compromise the computer. (ROAR can be configured for automatic access. Also, access can occur if the user clicks.) | []
| null | null | null | null |
|
GHSA-5cqh-5hxx-9w4g | There is a heap-based buffer over-read in the Sass::Prelexer::re_linebreak function in lexer.cpp in LibSass 3.4.5. A crafted input will lead to a remote denial of service attack. | []
| null | null | 6.5 | null |
|
RHSA-2017:0330 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:8::el7"
]
| null | null | 5.5 | null |
GHSA-4hg3-3xxj-v749 | A vulnerability was found in Mercurial SCM 4.5.3/71.19.145.211. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument cmd leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 5.3 | 4.3 | null | null |
|
CVE-2017-0583 | An elevation of privilege vulnerability in the Qualcomm CP access driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and because of vulnerability specific details which limit the impact of the issue. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32068683. References: QC-CR#1103788. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
]
| null | null | 7 | 7.6 |
|
CVE-2011-3979 | Cross-site scripting (XSS) vulnerability in ztemp/view_compiled/Theme/theme_admin_setasdefault.php in the theme module in Zikula Application Framework 1.3.0 build 3168, 1.2.7, and probably other versions allows remote attackers to inject arbitrary web script or HTML via the themename parameter in the setasdefault action to index.php. | [
"cpe:2.3:a:zikula:zikula_application_framework:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zikula:zikula_application_framework:1.3.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-74m7-9rv3-r9vp | Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.13, 3.0.x before 3.0.15, and 3.1.x before 3.1.9, and OTRS ITSM 2.1.x before 2.1.5, 3.0.x before 3.0.6, and 3.1.x before 3.1.6, allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an arbitrary element or (2) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element. | []
| null | null | null | null |
|
GHSA-phw2-vm3q-947w | In cPanel before 70.0.23, OpenID providers can inject arbitrary data into cPanel session files (SEC-368). | []
| null | null | 7.3 | null |
|
RHSA-2014:0038 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update | rhev: remote-viewer spice tls-stripping issue | [
"cpe:/a:redhat:rhev_manager:3"
]
| null | null | null | null |
CVE-2006-3442 | Unspecified vulnerability in Pragmatic General Multicast (PGM) in Microsoft Windows XP SP2 and earlier allows remote attackers to execute arbitrary code via a crafted multicast message. | [
"cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
]
| null | null | null | 7.6 |
|
CVE-2022-29041 | Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:jira:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:jira:3.7:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-c5g6-6xf7-qxp3 | Umbraco CMS vulnerable to stored Cross-site Scripting in the "dictionary name" on Dictionary section | ImpactThis can be leveraged to gain access to higher-privilege endpoints, e.g. if you get a user with admin privileges to run the code, you can potentially elevate all users and grant them admin privileges or access protected content.PatchesWill be patched in 14.3.1 and 15.0.0.WorkaroundsEnsure that access to the Dictionary section is only granted to trusted users. | []
| null | 4.2 | null | null |
CVE-2019-11171 | Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access. | [
"cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2019-19769 | In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
| null | 6.7 | null | 6.5 |
|
CVE-2017-14652 | SQL Injection vulnerability in mobiquo/lib/classTTForum.php in the Tapatalk plugin before 4.5.8 for MyBB allows an unauthenticated remote attacker to inject arbitrary SQL commands via an XML-RPC encoded document sent as part of the user registration process. | [
"cpe:2.3:a:tapatalk:tapatalk:*:*:*:*:*:mybb:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-rhh8-vf3p-5mx3 | Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. | []
| null | 8.8 | null | null |
|
GHSA-xmf6-v6j7-w4fp | This issue was addressed with improved checks. This issue is fixed in iOS 15 and iPadOS 15. A local attacker may be able to cause unexpected application termination or arbitrary code execution. | []
| null | null | null | null |
|
CVE-2021-47473 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els()"), intended to change:
bsg_job->request->msgcode == FC_BSG_HST_ELS_NOLOGIN
bsg_job->request->msgcode != FC_BSG_RPT_ELS
but changed it to:
bsg_job->request->msgcode == FC_BSG_RPT_ELS
instead.
Change the == to a != to avoid leaking the fcport structure or freeing
unallocated memory. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-rfj2-m755-7qfc | In the Linux kernel, the following vulnerability has been resolved:netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bitsIf the offset + length goes over the ethernet + vlan header, then the
length is adjusted to copy the bytes that are within the boundaries of
the vlan_ethhdr scratchpad area. The remaining bytes beyond ethernet +
vlan header are copied directly from the skbuff data area.Fix incorrect arithmetic operator: subtract, not add, the size of the
vlan header in case of double-tagged packets to adjust the length
accordingly to address CVE-2023-0179. | []
| null | null | null | null |
|
RHSA-2024:2551 | Red Hat Security Advisory: bind security update | bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
RHSA-2005:135 | Red Hat Security Advisory: squirrelmail security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
CVE-2022-48831 | ima: fix reference leak in asymmetric_verify() | In the Linux kernel, the following vulnerability has been resolved:
ima: fix reference leak in asymmetric_verify()
Don't leak a reference to the key if its algorithm is unknown. | []
| null | null | null | null |
GHSA-5r3q-54c5-hc9v | Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /schedules/view_schedule.php. | []
| null | 7.2 | null | null |
|
GHSA-hmpp-gh47-8r55 | Philips ISCV application prior to version 2.3.0 has an insufficient session expiration vulnerability where an attacker could reuse the session of a previously logged in user. This vulnerability exists when using ISCV together with an Electronic Medical Record (EMR) system, where ISCV is in KIOSK mode for multiple users and using Windows authentication. This may allow an attacker to gain unauthorized access to patient health information and potentially modify this information. | []
| null | null | 6.3 | null |
|
CVE-2016-4683 | An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted SGI file. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2022-41535 | Open Source SACCO Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /sacco_shield/manage_borrower.php. | [
"cpe:2.3:a:open_source_sacco_management_system_project:open_source_sacco_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-f239-9c8f-965h | Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | []
| null | null | 8.2 | null |
|
CVE-2021-29688 | IBM Security Identity Manager 7.0.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 200102. | [
"cpe:2.3:a:ibm:security_identity_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
]
| null | null | 5.3 | null |
|
RHSA-2019:1743 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: device_tree: heap buffer overflow while loading device tree blob | [
"cpe:/a:redhat:openstack:13::el7"
]
| null | null | 7 | null |
GHSA-w5hq-hm5m-4548 | Cross Site Scripting vulnerability in store2 | Cross Site Scripting vulnerability in nbubna store v.2.14.2 and before allows a remote attacker to execute arbitrary code via the store.deep.js component | []
| null | 6.1 | null | null |
GHSA-wr3p-8fm9-7f93 | Physical path Leakage exists in Western Bridge Cobub Razor 0.8.0 via an invalid channel_name parameter to /index.php?/manage/channel/addchannel or a direct request to /export.php. | []
| null | null | 7.5 | null |
|
CVE-2008-1608 | SQL injection vulnerability in postview.php in Clever Copy 3.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter, a different vector than CVE-2008-0363 and CVE-2006-0583. | [
"cpe:2.3:a:clever_copy:clever_copy:3.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-cp83-5j4q-292w | enq in bos.rte.printers in IBM AIX 6.1.0 through 6.1.2, when a print queue is defined in /etc/qconfig, allows local users to delete arbitrary files via unspecified vectors. | []
| null | null | null | null |
|
GHSA-9hgq-6x66-3wfh | The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks. | []
| null | 5.3 | null | null |
|
GHSA-jvh6-h6x8-v3hx | Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 were discovered to contain a stack overflow via the pin_3g_code parameter in the config_3g_para function. | []
| null | 5.3 | null | null |
|
GHSA-7c78-g5wc-hcch | The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system. | []
| 9.3 | 7.5 | null | null |
|
RHSA-2021:4933 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
]
| null | 9.8 | null | null |
RHSA-2017:2585 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: a race between inotify_handle_event() and sys_rename() | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | null | 7.8 | null |
GHSA-r28v-hx3g-9vww | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | 7.8 | null |
|
GHSA-8wgh-r989-wp43 | Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4. | []
| null | 7.1 | null | null |
|
GHSA-m59h-8962-2rc8 | The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI. | []
| null | null | null | null |
|
RHSA-2009:1625 | Red Hat Security Advisory: expat security update | expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences expat: buffer over-read and crash on XML with malformed UTF-8 sequences | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-g4pq-p927-7pgg | Jenkins Blue Ocean Plugin cross-site request forgery vulnerability | Jenkins Blue Ocean Plugin 1.27.5 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.This vulnerability allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.This issue is due to an incomplete fix of SECURITY-2502.Blue Ocean Plugin 1.27.5.1 uses the configured SCM URL, instead of a user-specified URL provided as a parameter to the HTTP endpoint. | []
| null | 5.4 | null | null |
CVE-2011-1228 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2023-42406 | SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. | [
"cpe:2.3:h:d-link:dar-7000:31r02b1413c:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dar-7000_firmware:31r02b1413c:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-659w-hffw-7j45 | SQL injection vulnerability in SourceCodester Theme Park Ticketing System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to view_user.php . | []
| null | null | null | null |
|
CVE-2021-44200 | Self cross-site scripting (XSS) was possible on devices page | Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035 | [
"cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
CVE-2024-35755 | WordPress Weather Widget Pro plugin <= 1.1.40 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in El tiempo Weather Widget Pro allows Stored XSS.This issue affects Weather Widget Pro: from n/a through 1.1.40. | [
"cpe:2.3:a:eltiempoen:weather_widget_pro:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2021-39626 | In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
CVE-2021-1651 | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:16.8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-27pp-94gr-r5v9 | Cross-site scripting (XSS) vulnerability in vbshout.php in DragonByte Technologies vBShout module for vBulletin allows remote attackers to inject arbitrary web script or HTML via the shout parameter in a shout action. | []
| null | null | 6.1 | null |
|
GHSA-qx9f-vqh8-4xpx | A vulnerability, which was classified as problematic, has been found in dazhouda lecms up to 3.0.3. Affected by this issue is some unknown functionality of the file /admin of the component Edit Profile Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 4.8 | 2.4 | null | null |
|
CVE-2014-2605 | Unspecified vulnerability in HP StoreVirtual 4000 Storage and StoreVirtual VSA 9.5 through 11.0 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:hp:storage_management_software:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:storage_management_software:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:storage_management_software:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:storage_management_software:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:storevirtual_vsa:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4330fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:storevirtual_4730fc:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-whp3-xq5f-wf78 | The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check in the '/pm/v2/settings/notice' endpoint all versions up to, and including, 2.6.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cause a persistent denial of service condition. | []
| null | 6.5 | null | null |
|
CVE-2023-40532 | Path traversal vulnerability in Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain partial information of the files on the web server. | [
"cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
|
CVE-2023-25699 | WordPress VideoWhisper Live Streaming Integration plugin <= 5.5.15 - Remote Code Execution (RCE) | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in VideoWhisper.Com VideoWhisper Live Streaming Integration allows OS Command Injection.This issue affects VideoWhisper Live Streaming Integration: from n/a through 5.5.15.
| [
"cpe:2.3:a:videowhisper:live_streaming_integration_plugin:*:*:*:*:*:*:*:*"
]
| null | 9 | null | null |
CVE-2019-9767 | Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wma file. | [
"cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:2.6:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2023-52066 | http.zig commit 76cf5 was discovered to contain a CRLF injection vulnerability via the url parameter. | [
"cpe:2.3:a:karlseguin:http.zig:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
RHSA-2013:0831 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2008-6979 | Cross-site scripting (XSS) vulnerability in as_archives.php in phpAdultSite CMS, possibly 2.3.2, allows remote attackers to inject arbitrary web script or HTML via the results_per_page parameter to index.php. NOTE: some of these details are obtained from third party information. NOTE: this issue might be resultant from a separate SQL injection vulnerability. | [
"cpe:2.3:a:phpadultsite:phpadultsite_cms:2.3.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2009-1496 | Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php. | [
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ijobid:com_cmimarketplace:0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-65hw-c9g5-r8mm | IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier. | []
| null | 10 | null | null |
|
CVE-2024-56638 | netfilter: nft_inner: incorrect percpu area handling under softirq | In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_inner: incorrect percpu area handling under softirq
Softirq can interrupt ongoing packet from process context that is
walking over the percpu area that contains inner header offsets.
Disable bh and perform three checks before restoring the percpu inner
header offsets to validate that the percpu area is valid for this
skbuff:
1) If the NFT_PKTINFO_INNER_FULL flag is set on, then this skbuff
has already been parsed before for inner header fetching to
register.
2) Validate that the percpu area refers to this skbuff using the
skbuff pointer as a cookie. If there is a cookie mismatch, then
this skbuff needs to be parsed again.
3) Finally, validate if the percpu area refers to this tunnel type.
Only after these three checks the percpu area is restored to a on-stack
copy and bh is enabled again.
After inner header fetching, the on-stack copy is stored back to the
percpu area. | []
| null | null | null | null |
GHSA-x445-q75c-3845 | Directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter. | []
| null | null | null | null |
|
PYSEC-2021-891 | null | CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. | []
| null | 7.8 | null | null |
CVE-2024-32126 | WordPress Navigation menu as dropdown Widget plugin <= 1.3.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters Navigation menu as Dropdown Widget allows Stored XSS.This issue affects Navigation menu as Dropdown Widget: from n/a through 1.3.4.
| [
"cpe:2.3:a:jeroen_peters:navigation_menu_as_dropdown_widget:*:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
GHSA-gx3q-72jh-pq5j | Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block. | []
| null | 5.5 | null | null |
|
CVE-2021-36191 | A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to use the device as proxy via crafted GET parameters in requests to error handlers | [
"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*"
]
| null | 4.1 | null | null |
|
CVE-2021-40366 | A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.42), Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit. | [
"cpe:2.3:o:siemens:climatix_pol909_firmware:*:*:*:*:advanced_web_module:*:*:*",
"cpe:2.3:o:siemens:climatix_pol909_firmware:*:*:*:*:advanced_web_and_bacnet_module:*:*:*",
"cpe:2.3:h:siemens:climatix_pol909:-:*:*:*:*:*:*:*"
]
| null | 7.4 | null | 5.8 |
|
RHSA-2020:5079 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | 5.5 | null | null |
GHSA-437p-pvrc-cr2c | WebCalendar 1.0.1 to 1.0.3 generates different error messages depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames. | []
| null | null | null | null |
|
CVE-2010-2574 | Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action. | [
"cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-9c6g-qpgj-rvxw | Streamlit publishes previously-patched Cross-site Scripting vulnerability | **Synopsis:** Streamlit open source publicizes a prior security fix implemented in 2021. The vulnerability affected Streamlit versions between 0.63.0 and 0.80.0 (inclusive) and was patched on April 21, 2021. If you are using Streamlit with version before 0.63.0 or after 0.80.0, no action is required.1. Impacted ProductsStreamilt Open Source versions between 0.63.0 and 0.80.0.2. IntroductionOn April 21, 2021, Streamlit merged a patch that fixed a cross-site scripting (XSS) vulnerability in the Streamlit open source library, without an associated public advisory. The vulnerability affected Streamlit versions between 0.63.0 and 0.80.0 (inclusive), which are no longer supported. We recommend using the latest version of our library, but so long as you are not using an affected Streamlit version, no action is required.3. Cross Site Scripting Vulnerability3.1 DescriptionOn April 20, 2021, Streamlit was informed via our support forum about a XSS vulnerability in the open source library. We fixed and merged a patch remediating the vulnerability on April 21st, 2021. The issue was determined to be in the moderate severity range with a maximum CVSSv3 base score of [5.9](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N)3.2 Scenarios and attack vector(s)Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to an XSS.3.3 Our responseStreamlit fixed and merged a patch for this vulnerability on April 21, 2021. The vulnerability was fixed within 24hrs of notification to Streamlit.3.4 ResolutionThe vulnerability has been fixed in all Streamlit versions released since April 21, 2021. The affected versions – those between 0.63.0 and 0.80.0 (inclusive) – are no longer supported. We recommend always using supported versions of the Streamlit open source library. Version 1.19.0 is current as of this advisory.4. ContactPlease contact [email protected] if you have any questions regarding this advisory. If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team). | []
| 6 | null | 5.9 | null |
CVE-2018-17234 | Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file. | [
"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
CVE-2008-5960 | SQL injection vulnerability in index.php in Tribiq CMS Community 5.0.10B and 5.0.11E allows remote attackers to execute arbitrary SQL commands via the cID parameter in a document action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:tribiq:tribiq_cms:5.0.10b:-:community:*:*:*:*:*",
"cpe:2.3:a:tribiq:tribiq_cms:5.0.11e:-:community:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-pq44-hr9j-8673 | An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar. | []
| null | 7.8 | null | null |
|
CVE-2017-13199 | In Bitmap.ccp if Bitmap.nativeCreate fails an out of memory exception is not thrown leading to a java.io.IOException later on. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-33846679. | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
GHSA-c58f-48r6-vx5g | Multiple PHP remote file inclusion vulnerabilities in aMember Pro 2.3.4 allow remote attackers to execute arbitrary PHP code via the config[root_dir] parameter to (1) mysql.inc.php, (2) efsnet.inc.php, (3) theinternetcommerce.inc.php, (4) cdg.inc.php, (5) compuworld.inc.php, (6) directone.inc.php, (7) authorize_aim.inc.php, (8) beanstream.inc.php, (9) config.inc.php, (10) eprocessingnetwork.inc.php, (11) eway.inc.php, (12) linkpoint.inc.php, (13) logiccommerce.inc.php, (14) netbilling.inc.php, (15) payflow_pro.inc.php, (16) paymentsgateway.inc.php, (17) payos.inc.php, (18) payready.inc.php, or (19) plugnplay.inc.php. | []
| null | null | null | null |
|
CVE-2013-4354 | The API before 2.1 in OpenStack Image Registry and Delivery Service (Glance) makes it easier for local users to inject images into arbitrary tenants by adding the tenant as a member of the image. | [
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):-:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2018-7228 | A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and get the administrator privileges. | [
"cpe:2.3:o:schneider-electric:mps110-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:mps110-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2024-40087 | Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Insecure Permissions. Lack of authentication in the custom TCP service on port 5432 allows remote, unauthenticated attackers to gain administrative access over the router. | [
"cpe:2.3:o:viloliving:vilo_5_mesh_wifi_system_firmware:*:*:*:*:*:*:*:*"
]
| null | 9.6 | null | null |
|
CVE-2001-1162 | Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. | [
"cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2024-10478 | LinZhaoguan pb-cms Edit Article edit cross site scripting | A vulnerability, which was classified as problematic, has been found in LinZhaoguan pb-cms up to 2.0.1. This issue affects some unknown processing of the file /admin#article/edit?id=2 of the component Edit Article Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.1 | 2.4 | 2.4 | 3.3 |
CVE-2020-9761 | An issue was discovered in UNCTAD ASYCUDA World 2001 through 2020. The Java RMI Server has an Insecure Default Configuration, leading to Java Code Execution from a remote URL because an RMI Distributed Garbage Collector method is called. | [
"cpe:2.3:a:unctad:asycuda_world:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2023-22012 | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server). The supported version that is affected is 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
]
| null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.