id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-633m-895c-3f9g | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0. | []
| null | 5.9 | null | null |
|
GHSA-fxcp-h947-pw6p | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow. | []
| null | 9.8 | null | null |
|
CVE-2007-0928 | Virtual Calendar stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an encoded password via a direct request for pwd.txt. | [
"cpe:2.3:a:virtual_calendar:virtual_calendar:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2005-3543 | SQL injection vulnerability in search.php in Phorum 5.0.0alpha through 5.0.20, when register_globals is enabled, allows remote attackers to execute arbitrary SQL commands via the forum_ids parameter. | [
"cpe:2.3:a:phorum:phorum:5.0.0_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.4_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.4a_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.5_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.6_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.7a_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.8_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.13a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.20:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-467r-xcxr-qrp7 | Gym Management System v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF). | []
| null | 4.5 | null | null |
|
CVE-2004-1970 | Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message. | [
"cpe:2.3:h:securecomputing:smartether_ss6215s_switch:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-47485 | In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
GHSA-xp6h-v5w9-gwqx | A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions), SICAM GridEdge Essential Intel (All versions < V2.7.3), SICAM GridEdge Essential with GDS ARM (All versions), SICAM GridEdge Essential with GDS Intel (All versions < V2.7.3). Affected software uses an improperly protected file to import SSH keys. Attackers with access to the filesystem of the host on which SICAM GridEdge runs, are able to inject a custom SSH key to that file. | []
| null | 5.5 | null | null |
|
GHSA-vgjf-wg4r-wfgj | RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the template_id parameter at /WorkFlow/wf_get_fields_approve.aspx. | []
| null | 9.4 | null | null |
|
CVE-2012-1174 | The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session." | [
"cpe:2.3:o:linux:systemd:43:*:*:*:*:*:*:*"
]
| null | null | null | 3.3 |
|
CVE-2006-3527 | Multiple PHP remote file inclusion vulnerabilities in BosClassifieds Classified Ads allow remote attackers to execute arbitrary PHP code via a URL in the insPath parameter to (1) index.php, (2) recent.php, (3) account.php, (4) classified.php, or (5) search.php. | [
"cpe:2.3:a:bosdev:bosclassifieds_classified_ads:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-gvhj-rrhv-wr5p | SQL injection vulnerability in projects/project-edit.asp in Digger Solutions Intranet Open Source (IOS) version 2.7.2 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. | []
| null | null | null | null |
|
GHSA-w3j3-mm7p-vp9m | The FTP service in Acritum Femitter Server 1.03 allows remote attackers to cause a denial of service (crash) by sending multiple crafted RETR commands. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2021-36286 | Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. | [
"cpe:2.3:a:dell:supportassist_client_consumer:*:*:*:*:*:*:*:*"
]
| null | 7.1 | null | null |
|
CVE-2015-1597 | The Siemens SPCanywhere application for Android does not use encryption during the loading of code, which allows man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream. | [
"cpe:2.3:a:siemens:spcanywhere:*:*:*:*:android:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2025-4830 | TOTOLINK A702R/A3002R/A3002RU HTTP POST Request formSysCmd buffer overflow | A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. Affected by this issue is some unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 8.7 | 8.8 | 8.8 | 9 |
RHSA-2014:1399 | Red Hat Security Advisory: Apache POI security update | apache-poi: XML eXternal Entity (XXE) flaw apache-poi: entity expansion (billion laughs) flaw | [
"cpe:/a:redhat:jboss_bpms:6.0"
]
| null | null | null | null |
CVE-2024-36262 | Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access. | []
| 8.6 | 7.2 | null | null |
|
GHSA-vfqw-535x-mpvj | Insufficient input validation in ASP may allow
an attacker with a compromised SMM to induce out-of-bounds memory reads within
the ASP, potentially leading to a denial of service. | []
| null | 7.5 | null | null |
|
GHSA-5h2c-vg38-fcwr | A global buffer overflow was discovered in the iteration_loop function in loop.c in BladeEnc version 0.94.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution. | []
| null | null | 9.8 | null |
|
GHSA-qhfv-pjhr-x49x | Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter. | []
| null | null | null | null |
|
GHSA-j8h7-m8w3-cjjq | Unknown vulnerability in Serendipity 0.8, when used with multiple authors, allows unprivileged authors to upload arbitrary media files. | []
| null | null | null | null |
|
GHSA-g78h-pf65-46rv | Enhanced Image plugin for CKEditor is vulnerable to Cross-site scripting (XSS) | The Enhanced Image (aka [image2](https://github.com/ckeditor/ckeditor4/tree/master/plugins/image2)) plugin for CKEditor in versions 4.5.10 through 4.9.1; fixed in 4.9.2, and as used in Drupal 8 before 8.4.7 and 8.5.x before 8.5.2 and other products, is vulnerable to cross-site scripting because it allows remote attackers to inject arbitrary web script through a crafted IMG element. | []
| null | null | 6.1 | null |
CVE-2020-16260 | Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation. | [
"cpe:2.3:o:winstonprivacy:winston_firmware:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:winstonprivacy:winston:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2022-49384 | md: fix double free of io_acct_set bioset | In the Linux kernel, the following vulnerability has been resolved:
md: fix double free of io_acct_set bioset
Now io_acct_set is alloc and free in personality. Remove the codes that
free io_acct_set in md_free and md_stop. | []
| null | 7.8 | null | null |
GHSA-862v-hwv2-mhqr | In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists when performing WCDMA radio tuning. | []
| null | null | 9.8 | null |
|
RHSA-2007:0387 | Red Hat Security Advisory: tcpdump security and bug fix update | tcpdump denial of service tcpdump BGP integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
CVE-2020-10075 | GitLab 12.5 through 12.8.1 allows HTML Injection. A particular error header was potentially susceptible to injection or potentially other vulnerabilities via unescaped input. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
]
| null | 6.1 | null | 5.8 |
|
RHSA-2012:1482 | Red Hat Security Advisory: firefox security update | Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93) Mozilla: Buffer overflow while rendering GIF images (MFSA 2012-92) Mozilla: Improper character decoding in HZ-GB-2312 charset (MFSA 2012-101) Mozilla: Frames can shadow top.location (MFSA 2012-103) Mozilla: CSS and HTML injection through Style Inspector (MFSA 2012-104) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Improper security filtering for cross-origin wrappers (MFSA 2012-100) Mozilla: Miscellaneous memory safety hazards (rv:10.0.11) (MFSA 2012-91) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
GHSA-272h-q2v7-f686 | A malicious website that causes an HTTP Authentication dialog to be spawned could trick the built-in password manager to suggest passwords for the currently active website instead of the website that triggered the dialog. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. | []
| null | null | null | null |
|
GHSA-29mr-mxx6-f3f5 | SQL injection vulnerability in the Pulse Infotech Sponsor Wall (com_sponsorwall) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php. | []
| null | null | null | null |
|
RHSA-2020:2926 | Red Hat Security Advisory: OpenShift Container Platform 4.4.13 openshift-enterprise-hyperkube-container security update | kubernetes: node localhost services reachable via martian packets | [
"cpe:/a:redhat:openshift:4.4::el7"
]
| null | 5.4 | null | null |
CVE-2006-5522 | Multiple PHP remote file inclusion vulnerabilities in Johannes Erdfelt Kawf 1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the config parameter in (1) main.php or (2) user/account/main.php. | [
"cpe:2.3:a:johannes_erdfelt:kawf:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2017-18422 | In cPanel before 66.0.2, EasyApache 4 conversion sets weak domlog ownership and permissions (SEC-272). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
| null | null | 3.3 | 2.1 |
|
GHSA-8m58-mc8v-v548 | Incorrect access control in the Dashboard API on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows attackers to bypass authentication due to insecure token generation. | []
| null | null | 9.8 | null |
|
CVE-2017-0450 | An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it is mitigated by current platform configurations. Product: Android. Versions: N/A. Android ID: A-32917432. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-rx9f-26mc-8crr | CloudView NMS before 2.10a allows remote attackers to obtain sensitive information via a direct request for admin/auto.def. | []
| null | null | 7.5 | null |
|
CVE-2020-27277 | Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code. | [
"cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 9.3 |
|
CVE-2007-2485 | PHP remote file inclusion vulnerability in myflash-button.php in the myflash 1.00 and earlier plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the wpPATH parameter. | [
"cpe:2.3:a:ruben_boelinger:myflash:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-20859 | In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token. | [
"cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_cloud_vault:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_cloud_vault:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_vault:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-9r7x-657q-46cm | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzSerial param is not object. An attacker can send an HTTP request to trigger this vulnerability. | []
| null | 6.5 | null | null |
|
CVE-2008-3994 | Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to WMSYS.LTADM. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:*"
]
| null | null | null | 5.5 |
|
GHSA-fqrv-m6p4-qfhh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Sprout Clients allows Stored XSS. This issue affects Sprout Clients: from n/a through 3.2. | []
| null | 6.5 | null | null |
|
CVE-2019-16941 | NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary code execution if the Read XML Files feature of Bit Patterns Explorer is used with a modified XML document. This occurs in Features/BytePatterns/src/main/java/ghidra/bitpatterns/info/FileBitPatternInfoReader.java. An attack could start with an XML document that was originally created by DumpFunctionPatternInfoScript but then directly modified by an attacker (for example, to make a java.lang.Runtime.exec call). | [
"cpe:2.3:a:nsa:ghidra:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 6.8 |
|
CVE-2024-23959 | Autel MaxiCharger AC Elite Business C50 BLE AppChargingControl Stack-based Buffer Overflow Remote Code Execution Vulnerability | Autel MaxiCharger AC Elite Business C50 BLE AppChargingControl Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the handling of the AppChargingControl BLE command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23194 | [
"cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_eu_firmware:1.50:*:*:*:*:*:*:*",
"cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:1.32.00:*:*:*:*:*:*:*",
"cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
CVE-2020-6461 | Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 9.6 | null | 6.8 |
|
GHSA-vhmc-97xx-rvxh | Memory corruption in Graphics while importing a file. | []
| null | 8.4 | null | null |
|
GHSA-wcfj-m59v-ggwc | Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands. | []
| null | 6.3 | null | null |
|
CVE-2003-1410 | PHP remote file inclusion vulnerability in email.php (aka email.php3) in Cedric Email Reader 0.2 and 0.3 allows remote attackers to execute arbitrary PHP code via the cer_skin parameter. | [
"cpe:2.3:a:isoca:cedric_email_reader:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isoca:cedric_email_reader:0.3:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-ff3f-xx5v-vrhq | Adobe Bridge CC versions 9.0.2 have a memory corruption vulnerability. Successful exploitation could lead to information disclosure. | []
| null | null | null | null |
|
CVE-2008-5571 | SQL injection vulnerability in admin/login.asp in Professional Download Assistant 0.1 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter (aka user field) or the (2) psw parameter (aka passwd field). NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:dotnetindex:professional_download_assistant:0.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-m7gw-r3vf-gf9w | In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(&gb) is called on an uninitialized get_bits context, which causes a NULL deref exception. | []
| null | null | 6.5 | null |
|
CVE-2002-1063 | Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of FTP PASV requests, which consumes all available FTP ports. | [
"cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2022-4937 | The WCFM Frontend Manager plugin for WordPress is vulnerable to unauthorized modification and access of data in versions up to, and including, 6.6.0 due to missing capability checks on various AJAX actions. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to perform a wide variety of actions such as modifying knowledge bases, modifying notices, modifying payments, managing vendors, capabilities, and so much more. There were hundreds of AJAX endpoints affected. | [
"cpe:2.3:a:wclovers:frontend_manager_for_woocommerce_along_with_bookings_subscription_listings_compatible:*:*:*:*:*:wordpress:*:*"
]
| null | 6.3 | null | null |
|
CVE-2006-1996 | Scry Gallery 1.1 allows remote attackers to obtain sensitive information via an invalid p parameter, which reveals the path in an error message. | [
"cpe:2.3:a:scry_gallery:scry_gallery:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2022:0557 | Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
]
| null | 4.8 | null | null |
CVE-2013-5113 | LastPass prior to 2.5.1 has an insecure PIN implementation. | [
"cpe:2.3:a:logmein:lastpass:*:*:*:*:*:android:*:*"
]
| null | 6.8 | null | 1.9 |
|
GHSA-jvvx-6w65-rj24 | Memory corruption in BT controller while parsing debug commands with specific sub-opcodes at HCI interface level. | []
| null | 7.8 | null | null |
|
GHSA-wv69-7r49-cw5h | Cross-site scripting (XSS) vulnerability in auth.asp on the D-LINK DKVM-IP8 with firmware 2282_dlinkA4_p8_20071213 allows remote attackers to inject arbitrary web script or HTML via the nickname parameter. | []
| null | null | null | null |
|
GHSA-56jr-5rr7-hg8x | Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. | []
| null | null | null | null |
|
GHSA-7qm6-8g5f-g9v3 | SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One on SAP HANA, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the application thereby highly impacting the integrity and availability of the application. | []
| null | null | null | null |
|
RHSA-2008:0937 | Red Hat Security Advisory: cups security update | CUPS: SGI image parser heap-based buffer overflow CUPS: texttops integer overflow CUPS: HP/GL reader insufficient bounds checking | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-wqjj-m8wc-5cjj | Unspecified vulnerability in the KKtalk (com.kkliaotian.android) application 4.0.0 and 4.1.5 for Android has unknown impact and attack vectors. | []
| null | null | null | null |
|
CVE-2009-4843 | ToutVirtual VirtualIQ Pro before 3.5 build 8691 does not require administrative authentication for JBoss console access, which allows remote attackers to execute arbitrary commands via requests to (1) the JMX Management Console or (2) the Web Console. | [
"cpe:2.3:a:toutvirtual:virtualiq:3.5:-:pro:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2017-14344 | This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x95382673 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. | [
"cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 7.2 |
|
CVE-2021-28453 | Microsoft Word Remote Code Execution Vulnerability | Microsoft Word Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-j3pp-77jw-4qv6 | A vulnerability was found in Global Scape CuteFTP 9.3.0.3 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument Host/Username/Password leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252680. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 3.3 | null | null |
|
ICSA-12-150-01 | Honeywell HMIWeb Browser Buffer Overflow Vulnerability | Stack-based buffer overflow in the HMIWeb Browser HSCDSPRenderDLL ActiveX control in Honeywell Process Solutions (HPS) Experion R2xx, R30x, R31x, and R400.x; Honeywell Building Solutions (HBS) Enterprise Building Manager R400 and R410.1; and Honeywell Environmental Combustion and Controls (ECC) SymmetrE R410.1 allows remote attackers to execute arbitrary code via unspecified vectors. | []
| null | null | null | null |
RHSA-2019:0985 | Red Hat Security Advisory: mod_auth_mellon security update | mod_auth_mellon: authentication bypass in ECP flow | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | null | 8.1 | null |
CVE-2024-10121 | wfh45678 Radar Interface authorization | A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:radar:radar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:riskengine:radar:*:*:*:*:*:*:*:*"
]
| 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2020-9440 | A cross-site scripting (XSS) vulnerability in the WSC plugin through 5.5.7.5 for CKEditor 4 allows remote attackers to run arbitrary web script inside an IFRAME element by injecting a crafted HTML element into the editor. | [
"cpe:2.3:a:ckeditor:ckeditor:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webspellchecker:webspellchecker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2024-21491 | Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature.
**Note:**
The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues. | [
"cpe:2.3:a:svix:svix-webhooks:*:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
|
RHSA-2002:218 | Red Hat Security Advisory: tomcat security update for Stronghold | security flaw | [
"cpe:/a:redhat:rhel_stronghold:4"
]
| null | null | null | null |
CVE-2022-48629 | crypto: qcom-rng - ensure buffer for generate is completely filled | In the Linux kernel, the following vulnerability has been resolved:
crypto: qcom-rng - ensure buffer for generate is completely filled
The generate function in struct rng_alg expects that the destination
buffer is completely filled if the function returns 0. qcom_rng_read()
can run into a situation where the buffer is partially filled with
randomness and the remaining part of the buffer is zeroed since
qcom_rng_generate() doesn't check the return value. This issue can
be reproduced by running the following from libkcapi:
kcapi-rng -b 9000000 > OUTFILE
The generated OUTFILE will have three huge sections that contain all
zeros, and this is caused by the code where the test
'val & PRNG_STATUS_DATA_AVAIL' fails.
Let's fix this issue by ensuring that qcom_rng_read() always returns
with a full buffer if the function returns success. Let's also have
qcom_rng_generate() return the correct value.
Here's some statistics from the ent project
(https://www.fourmilab.ch/random/) that shows information about the
quality of the generated numbers:
$ ent -c qcom-random-before
Value Char Occurrences Fraction
0 606748 0.067416
1 33104 0.003678
2 33001 0.003667
...
253 � 32883 0.003654
254 � 33035 0.003671
255 � 33239 0.003693
Total: 9000000 1.000000
Entropy = 7.811590 bits per byte.
Optimum compression would reduce the size
of this 9000000 byte file by 2 percent.
Chi square distribution for 9000000 samples is 9329962.81, and
randomly would exceed this value less than 0.01 percent of the
times.
Arithmetic mean value of data bytes is 119.3731 (127.5 = random).
Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).
Serial correlation coefficient is 0.159130 (totally uncorrelated =
0.0).
Without this patch, the results of the chi-square test is 0.01%, and
the numbers are certainly not random according to ent's project page.
The results improve with this patch:
$ ent -c qcom-random-after
Value Char Occurrences Fraction
0 35432 0.003937
1 35127 0.003903
2 35424 0.003936
...
253 � 35201 0.003911
254 � 34835 0.003871
255 � 35368 0.003930
Total: 9000000 1.000000
Entropy = 7.999979 bits per byte.
Optimum compression would reduce the size
of this 9000000 byte file by 0 percent.
Chi square distribution for 9000000 samples is 258.77, and randomly
would exceed this value 42.24 percent of the times.
Arithmetic mean value of data bytes is 127.5006 (127.5 = random).
Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).
Serial correlation coefficient is 0.000468 (totally uncorrelated =
0.0).
This change was tested on a Nexus 5 phone (msm8974 SoC). | []
| null | 5.5 | null | null |
GHSA-c2w6-8h36-xfq5 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287612. | []
| null | 5.3 | null | null |
|
CVE-2018-7498 | In Philips Alice 6 System version R8.0.2 or prior, the lack of proper data encryption passes up the guarantees of confidentiality, integrity, and accountability that properly implemented encryption conveys. | [
"cpe:2.3:o:philips:alice_6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:philips:alice_6:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
GHSA-92qw-m8c2-5f3v | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). | []
| null | null | 6.5 | null |
|
GHSA-5pqr-836h-25qw | Cross-site request forgery (CSRF) vulnerability in admin/admin_options.php in VR GPub 4.0 allows remote attackers to hijack the authentication of admins for requests that add admin accounts via an add action. | []
| null | null | null | null |
|
CVE-2024-26671 | blk-mq: fix IO hang from sbitmap wakeup race | In the Linux kernel, the following vulnerability has been resolved:
blk-mq: fix IO hang from sbitmap wakeup race
In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered
with the following blk_mq_get_driver_tag() in case of getting driver
tag failure.
Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe
the added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime
blk_mq_mark_tag_wait() can't get driver tag successfully.
This issue can be reproduced by running the following test in loop, and
fio hang can be observed in < 30min when running it on my test VM
in laptop.
modprobe -r scsi_debug
modprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4
dev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`
fio --filename=/dev/"$dev" --direct=1 --rw=randrw --bs=4k --iodepth=1 \
--runtime=100 --numjobs=40 --time_based --name=test \
--ioengine=libaio
Fix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which
is just fine in case of running out of tag. | []
| null | 4.7 | null | null |
GHSA-44jp-7fhf-24gg | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446. | []
| null | null | 5.5 | null |
|
GHSA-576m-4rvh-6rff | This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925. | []
| null | null | null | null |
|
RHSA-2004:447 | Red Hat Security Advisory: gdk-pixbuf security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
CVE-2020-2015 | PAN-OS: Buffer overflow in the management server | A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7; PAN-OS 9.1 versions earlier than 9.1.1; All versions of PAN-OS 8.0. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2023-6873 | Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 121. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-xpjq-rwvv-6r33 | An information disclosure vulnerability exists in the Thermal Driver, where a missing bounds checking in the thermal driver could allow a read from an arbitrary kernel address. This issue is rated as moderate. Product: Pixel. Versions: N/A. Android ID: A-34702397. References: N-CVE-2017-6275. | []
| null | null | 7.5 | null |
|
CVE-2020-12125 | A remote buffer overflow vulnerability in the /cgi-bin/makeRequest.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary machine instructions as root without authentication. | [
"cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
GHSA-mrg2-3353-vhcw | SQL injection vulnerability in login_check.asp in ClickAuction allows remote attackers to execute arbitrary SQL commands via the (1) txtEmail and (2) txtPassword parameters. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
CVE-2023-52629 | sh: push-switch: Reorder cleanup operations to avoid use-after-free bug | In the Linux kernel, the following vulnerability has been resolved:
sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
The original code puts flush_work() before timer_shutdown_sync()
in switch_drv_remove(). Although we use flush_work() to stop
the worker, it could be rescheduled in switch_timer(). As a result,
a use-after-free bug can occur. The details are shown below:
(cpu 0) | (cpu 1)
switch_drv_remove() |
flush_work() |
... | switch_timer // timer
| schedule_work(&psw->work)
timer_shutdown_sync() |
... | switch_work_handler // worker
kfree(psw) // free |
| psw->state = 0 // use
This patch puts timer_shutdown_sync() before flush_work() to
mitigate the bugs. As a result, the worker and timer will be
stopped safely before the deallocate operations. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
CVE-2014-4575 | Cross-site scripting (XSS) vulnerability in js/window.php in the Wikipop plugin 2.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. | [
"cpe:2.3:a:wikipop_plugin_project:wikipop:*:*:*:*:*:wordpress:*:*"
]
| null | null | null | 4.3 |
|
CVE-2008-5410 | The PK11_SESSION cache in the OpenSSL PKCS#11 engine in Sun Solaris 10 does not maintain reference counts for operations with asymmetric keys, which allows context-dependent attackers to cause a denial of service (failed cryptographic operations) via unspecified vectors, related to the (1) RSA_sign and (2) RSA_verify functions. | [
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2014-4966 | Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, and does not prevent remote data with "{{" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data. | [
"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-8799-xc4m-6fcp | Improper initialization in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access. | []
| 4.6 | 2.3 | null | null |
|
GHSA-fvch-gj67-rr73 | Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution. | []
| null | 8.8 | null | null |
|
ICSA-21-175-01 | FATEK Automation WinProladder | The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.CVE-2021-32990 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.CVE-2021-32988 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product does not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code.CVE-2021-32992 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 7.8 | null |
GHSA-5cqh-65ph-mxcx | Buffer overflow in the UnlockSupport function in the LockModules subsystem in a certain ActiveX control in ltmm15.dll in Sienzo Digital Music Mentor (DMM) 2.6.0.4 allows remote attackers to execute arbitrary code via a long string in the second argument, a different issue than CVE-2007-2564. | []
| null | null | null | null |
|
CVE-2018-1153 | Burp Suite Community Edition 1.7.32 and 1.7.33 fail to validate the server certificate in a couple of HTTPS requests which allows a man in the middle to modify or view traffic. | [
"cpe:2.3:a:portswigger:burp_suite:1.7.32:*:*:*:community:*:*:*",
"cpe:2.3:a:portswigger:burp_suite:1.7.33:*:*:*:community:*:*:*"
]
| null | null | 7.4 | 5.8 |
|
GHSA-qwwp-27qm-g533 | MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection mechanism by modifying the textcha-question and textcha-answer fields to have empty values. | []
| null | null | null | null |
|
CVE-2008-3498 | SQL injection vulnerability in the nBill (com_netinvoice) component 1.2.0 SP1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter in an orders action to index.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:netshinesoftware:com_netinvoice:1.2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-3jf7-xpv3-x9vh | Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via the (2) csj_width, (3) csj_height, (4) csj_sleep, (5) csj_fade, or (6) upload_image parameter in the thisismyurl_csj.php page to wp-admin/options-general.php. | []
| null | null | null | null |
|
CVE-2018-1558 | IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142956. | [
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*"
]
| null | null | 5.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.