id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-f4c6-vp9v-vmq4 | The UIKit component in Apple iPhone OS 3.0, and iPhone OS 3.0.1 for iPod touch, allows physically proximate attackers to discover a password by watching a user undo deletions of characters in the password. | []
| null | null | null | null |
|
GHSA-9qxg-p5xw-qhff | Cross-site scripting (XSS) vulnerability in MyBulletinBoard (MyBB) allows remote attackers to inject arbitrary web script or HTML via a signature containing a JavaScript URI in the SRC attribute of an IMG element, in which the URI uses SGML numeric character references without trailing semicolons, as demonstrated by "javascript". | []
| null | null | null | null |
|
PYSEC-2021-319 | null | An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place. | []
| null | null | null | null |
CVE-2018-18935 | An issue was discovered in PopojiCMS v2.0.1. It has CSRF via the po-admin/route.php?mod=component&act=addnew URI, as demonstrated by adding a level=1 account. | [
"cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-xv4w-vgqg-qwrq | The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approve registration for any user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 5.4 | null | null |
|
CVE-2019-9964 | XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey. | [
"cpe:2.3:a:xnview:xnview_mp:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
GHSA-mfm4-69wq-jq8q | Multiple unspecified vulnerabilities in the Workspace Manager component in Oracle Database before OWM 10.2.0.4.1, OWM 10.1.0.8.0, and OWM 9.2.0.8.0 have unknown impact and remote attack vectors, aka (1) DB08, (2) DB09, (3) DB10, (4) DB11, (5) DB12, (6) DB13, (7) DB14, (8) DB15, (9) DB16, (10) DB17, and (11) DB18. NOTE: one of these issues is probably CVE-2007-5511, but there are insufficient details to be certain. | []
| null | null | null | null |
|
GHSA-83q5-2fq5-fmp5 | SQL injection vulnerability in view_user.php in WowBB 1.6, 1.61, and 1.62 allows remote attackers to execute arbitrary SQL commands via the sort_by parameter. | []
| null | null | null | null |
|
GHSA-cqwc-4m4r-gw28 | SAP Commerce, versions - 6.7, 1808, 1811, 1905, and SAP Commerce (Data Hub), versions - 6.7, 1808, 1811, 1905, allows an attacker to bypass the authentication and/or authorization that has been configured by the system administrator due to the use of Hardcoded Credentials. | []
| null | null | null | null |
|
GHSA-rg69-mc23-3q8q | Cross-site scripting vulnerabilities in PostBoard 2.0.1 and earlier allows remote attackers to execute script as other users via (1) an [IMG] tag when BBCode is enabled, or (2) in a topic title. | []
| null | null | null | null |
|
CVE-2019-7898 | Samples of disabled downloadable products are accessible in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 due to inadequate validation of user input. | [
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-8gq4-c5hv-w395 | Multiple cross-site scripting (XSS) vulnerabilities in Bloxx Web Filtering before 5.0.14 allow (1) remote attackers to inject arbitrary web script or HTML via web traffic that is examined within the Bloxx Reports component, and allow (2) remote authenticated administrators to inject arbitrary web script or HTML via vectors involving administrative menu functions. | []
| null | null | null | null |
|
GHSA-9jgj-47fm-vx62 | A possible integer overflow may happen in WLAN during memory allocation in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660 | []
| null | null | 7.8 | null |
|
GHSA-593c-xgp7-3qpp | Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message. | []
| null | null | null | null |
|
CVE-2023-36617 | A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. | [
"cpe:2.3:a:ruby-lang:uri:*:*:*:*:*:ruby:*:*"
]
| null | 5.3 | null | null |
|
CVE-2019-15089 | An issue was discovered in PRiSE adAS 1.7.0. Forms have no CSRF protection, letting an attacker execute actions as the administrator. | [
"cpe:2.3:a:prise:adas:1.7.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-m2hh-r2mw-qmmh | IBM Security Directory Server 6.4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 165951. | []
| null | 5.3 | null | null |
|
CVE-2024-13240 | Open Social - Moderately critical - Access bypass - SA-CONTRIB-2024-004 | Improper Access Control vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.05. | []
| null | 7.5 | null | null |
RHSA-2014:1023 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: insufficient permision checks of netlink messages kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: powerpc: tm: crash when forking inside a transaction Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: s390: ptrace: insufficient sanitization when setting psw mask kernel: sctp: sk_ack_backlog wrap-around problem | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
GHSA-jg4j-hqh7-5qcx | The wp_validate_auth_cookie function in wp-includes/pluggable.php in WordPress before 3.7.2 and 3.8.x before 3.8.2 does not properly determine the validity of authentication cookies, which makes it easier for remote attackers to obtain access via a forged cookie. | []
| null | null | null | null |
|
GHSA-v3hq-g424-5mgg | Magento Improper Access Control vulnerability | Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. | []
| null | 6.5 | null | null |
CVE-2023-30532 | A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository. | [
"cpe:2.3:a:jenkins:turboscript:*:*:*:*:*:jenkins:*:*"
]
| null | 6.5 | null | null |
|
CVE-2024-11924 | Email Subscribers < 5.7.52 - Admin+ Stored XSS | The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 3.5 | null | null |
GHSA-28h6-qj9x-44jv | Parallels Desktop Updater Improper Initialization Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.The specific flaw exists within the Updater service. The issue results from the lack of proper initialization of environment variables. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-18253. | []
| null | null | 7.8 | null |
|
CVE-2025-22859 | A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited arbitrary file write on the system via upload requests. | []
| null | 5 | null | null |
|
RHSA-2019:2663 | Red Hat Security Advisory: firefox security update | Mozilla: Sandbox escape through Firefox Sync firefox: stored passwords in 'Saved Logins' can be copied without master password entry Mozilla: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1 Mozilla: Content security policy bypass through hash-based sources in directives Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images Mozilla: Cross-origin access to unload event attributes Mozilla: XSS by breaking out of title and textarea elements using innerHTML Mozilla: Use-after-free while manipulating video Mozilla: 'Forget about this site' removes sites from pre-loaded HSTS list Mozilla: Persistence of WebRTC permissions in a third party context Mozilla: Camera information available without prompting using getUserMedia Mozilla: Type confusion in Spidermonkey Mozilla: Use-after-free while extracting a key value in IndexedDB | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | 6.1 | null |
CVE-2022-45931 | A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. | [
"cpe:2.3:a:linuxfoundation:opendaylight:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:opendaylight:0.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:opendaylight:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:opendaylight:0.16.4:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-rh54-cr6f-xqph | A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add_reserve.php. The manipulation of the argument firstname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | []
| 5.5 | 7.3 | null | null |
|
GHSA-gcq4-9r7m-cj9j | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0893, CVE-2019-0894, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902. | []
| null | null | null | null |
|
GHSA-x2p3-rp28-j4v2 | SQL injection vulnerability in RoomPHPlanning 1.5 allows remote attackers to execute arbitrary SQL commands via the idresa parameter to resaopen.php. | []
| null | null | null | null |
|
GHSA-fpvg-m786-h5vr | Dolibarr vulnerable to unauthenticated database access | An issue in Dolibarr v16.0.0 to v16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists. | []
| null | 7.5 | null | null |
RHSA-2024:4625 | Red Hat Security Advisory: thunderbird security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
]
| null | 7.5 | null | null |
CVE-2012-1942 | The Mozilla Updater and Windows Updater Service in Mozilla Firefox 12.0, Thunderbird 12.0, and SeaMonkey 2.9 on Windows allow local users to gain privileges by loading a DLL file in a privileged context. | [
"cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
RHSA-2017:3195 | Red Hat Security Advisory: httpd security update | httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
]
| null | null | 5.9 | null |
CVE-2024-20951 | Vulnerability in the Oracle Customer Interaction History product of Oracle E-Business Suite (component: Outcome-Result). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:customer_interaction_history:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-49rx-vpxq-535f | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials. | []
| null | 4.8 | null | null |
|
GHSA-cfv3-gm8p-p6p7 | In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564 | []
| null | null | null | null |
|
RHSA-2024:2700 | Red Hat Security Advisory: varnish security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
]
| null | 7.5 | null | null |
CVE-2020-27693 | Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 stores administrative passwords using a hash that is considered outdated. | [
"cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 4.4 | null | 2.1 |
|
CVE-2006-2963 | Cross-site scripting (XSS) vulnerability in Suchergebnisse.asp in Cabacos Web CMS 3.8.498 and earlier allows remote attackers to inject arbitrary web script or HTML via the suchtext parameter. | [
"cpe:2.3:a:it-direkt:cabacos_web_cms:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-93h9-v8g8-jrg6 | On BIG-IP 14.1.0-14.1.2.3, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.4.1, when processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event. | []
| null | null | null | null |
|
GHSA-fq4g-p58q-8f6g | Eval injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a, when index.php3 from the PHPLib distribution is available on the server, allows remote attackers to execute arbitrary PHP code by including a base64-encoded representation of the code in a cookie. NOTE: this description was significantly updated on 20060605 to reflect new details after an initial vague advisory. | []
| null | null | null | null |
|
CVE-2017-11113 | In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data. | [
"cpe:2.3:a:gnu:ncurses:6.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2022-48379 | In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-6g45-r6rv-4qx7 | D-Link DIR-815 devices with firmware before 2.07.B01 allow remote attackers to obtain sensitive information by leveraging cleartext storage of the administrative password. | []
| null | null | 9.8 | null |
|
GHSA-frx9-99ch-7q7j | The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and OOPS) via certain code that makes ptrace PTRACE_SETREGS and PTRACE_SINGLESTEP requests, related to the TRACE_IRQS_ON function, and possibly related to the arch_ptrace function. | []
| null | null | null | null |
|
RHSA-2022:1702 | Red Hat Security Advisory: firefox security update | Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 9.8 | 7.5 | null |
GHSA-6h48-8w2f-5w94 | An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory. | []
| null | 8.2 | null | null |
|
GHSA-fqw2-3v24-gc79 | The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | []
| null | null | 5.9 | null |
|
CVE-2021-27179 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string. | [
"cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-ph64-wm3p-cq9q | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an "offset of a NULL pointer." | []
| null | null | null | null |
|
CVE-2020-8657 | An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token. | [
"cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 5 |
|
GHSA-72gm-6qcq-3xmp | In the Linux kernel, the following vulnerability has been resolved:asix: fix uninit-value in asix_mdio_read()asix_read_cmd() may read less than sizeof(smsr) bytes and in this case
smsr will be uninitialized.Fail log:
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 | []
| null | 7.1 | null | null |
|
GHSA-h697-5q9g-45h6 | Cross-Site Request Forgery (CSRF) vulnerability in SedLex FavIcon Switcher plugin <= 1.2.11 at WordPress allows plugin settings change. | []
| null | 4.3 | null | null |
|
RHSA-2009:0013 | Red Hat Security Advisory: avahi security update | avahi: avahi-daemon DoS (application abort) via packet with source port 0 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2022-23944 | Apache ShenYu 2.4.1 Improper access control | User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | [
"cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:shenyu:2.4.1:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 6.4 |
CVE-2024-48766 | NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php. | []
| null | 8.6 | null | null |
|
CVE-2016-4255 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2025-24886 | pwn.college has Symlink LFI in Dojo repos | pwn.college is an education platform to learn about, and practice, core cybersecurity concepts in a hands-on fashion. Incorrect symlink checks on user specified dojos allows for users (admin not required) to perform an LFI from the CTFd container. When a user clones or updates repositories, a check is performed to see if the repository had contained any symlinks. A malicious user could craft a repository with symlinks pointed to sensitive files and then retrieve them using the CTFd website. | []
| null | 7.7 | null | null |
GHSA-q4qh-8pxw-r48q | Subrion CMS vulnerable to Cross Site Scripting | Subrion CMS 4.2.1 is vulnerable to Cross Site Scripting (XSS) via adminer.php. | []
| null | 6.1 | null | null |
GHSA-mxmh-phj2-x55c | The fs-shopping-cart plugin 2.07.02 for WordPress has SQL injection via the pid parameter. | []
| null | 7.2 | null | null |
|
CVE-2021-43180 | In JetBrains Hub before 2021.1.13690, information disclosure via avatar metadata is possible. | [
"cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2024-30634 | Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the mitInterface parameter in the fromAddressNat function. | [
"cpe:2.3:o:tenda:f1202_firmware:1.2.0.20\\(408\\):*:*:*:*:*:*:*"
]
| null | 8 | null | null |
|
RHSA-2015:1020 | Red Hat Security Advisory: java-1.7.1-ibm security update | jar: directory traversal vulnerability JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK) JDK: unspecified Java sandbox restrictions bypass JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified partial Java sandbox restrictions bypass SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
]
| null | null | null | null |
GHSA-2rqj-66p3-64g9 | SQL injection vulnerability in inc_pollingboothmanager.asp in DMXReady Polling Booth Manager allows remote attackers to execute arbitrary SQL commands via the QuestionID parameter in a results action. | []
| null | null | null | null |
|
GHSA-2r7w-6p29-5vf5 | Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <= 2.1.7 vulnerability. | []
| null | 4.3 | null | null |
|
GHSA-46p2-hff5-p9cv | This vulnerability allows remote attackers to execute code by creating arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp._3d.add_005f3d_005fview_005fdo_jsp servlet, which listens on TCP port 8081 by default. When parsing the filename parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5197. | []
| null | null | 8.8 | null |
|
CVE-2004-0961 | Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes. | [
"cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-m645-2c8g-gg4p | In the Linux kernel, the following vulnerability has been resolved:NFC: NULL out the dev->rfkill to prevent UAFCommit 3e3b5dfcd16a ("NFC: reorder the logic in nfc_{un,}register_device")
assumes the device_is_registered() in function nfc_dev_up() will help
to check when the rfkill is unregistered. However, this check only
take effect when device_del(&dev->dev) is done in nfc_unregister_device().
Hence, the rfkill object is still possible be dereferenced.The crash trace in latest kernel (5.18-rc2):[ 68.760105] ==================================================================
[ 68.760330] BUG: KASAN: use-after-free in __lock_acquire+0x3ec1/0x6750
[ 68.760756] Read of size 8 at addr ffff888009c93018 by task fuzz/313
[ 68.760756]
[ 68.760756] CPU: 0 PID: 313 Comm: fuzz Not tainted 5.18.0-rc2 #4
[ 68.760756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 68.760756] Call Trace:
[ 68.760756] <TASK>
[ 68.760756] dump_stack_lvl+0x57/0x7d
[ 68.760756] print_report.cold+0x5e/0x5db
[ 68.760756] ? __lock_acquire+0x3ec1/0x6750
[ 68.760756] kasan_report+0xbe/0x1c0
[ 68.760756] ? __lock_acquire+0x3ec1/0x6750
[ 68.760756] __lock_acquire+0x3ec1/0x6750
[ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 68.760756] ? register_lock_class+0x18d0/0x18d0
[ 68.760756] lock_acquire+0x1ac/0x4f0
[ 68.760756] ? rfkill_blocked+0xe/0x60
[ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 68.760756] ? mutex_lock_io_nested+0x12c0/0x12c0
[ 68.760756] ? nla_get_range_signed+0x540/0x540
[ 68.760756] ? _raw_spin_lock_irqsave+0x4e/0x50
[ 68.760756] _raw_spin_lock_irqsave+0x39/0x50
[ 68.760756] ? rfkill_blocked+0xe/0x60
[ 68.760756] rfkill_blocked+0xe/0x60
[ 68.760756] nfc_dev_up+0x84/0x260
[ 68.760756] nfc_genl_dev_up+0x90/0xe0
[ 68.760756] genl_family_rcv_msg_doit+0x1f4/0x2f0
[ 68.760756] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x230/0x230
[ 68.760756] ? security_capable+0x51/0x90
[ 68.760756] genl_rcv_msg+0x280/0x500
[ 68.760756] ? genl_get_cmd+0x3c0/0x3c0
[ 68.760756] ? lock_acquire+0x1ac/0x4f0
[ 68.760756] ? nfc_genl_dev_down+0xe0/0xe0
[ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 68.760756] netlink_rcv_skb+0x11b/0x340
[ 68.760756] ? genl_get_cmd+0x3c0/0x3c0
[ 68.760756] ? netlink_ack+0x9c0/0x9c0
[ 68.760756] ? netlink_deliver_tap+0x136/0xb00
[ 68.760756] genl_rcv+0x1f/0x30
[ 68.760756] netlink_unicast+0x430/0x710
[ 68.760756] ? memset+0x20/0x40
[ 68.760756] ? netlink_attachskb+0x740/0x740
[ 68.760756] ? __build_skb_around+0x1f4/0x2a0
[ 68.760756] netlink_sendmsg+0x75d/0xc00
[ 68.760756] ? netlink_unicast+0x710/0x710
[ 68.760756] ? netlink_unicast+0x710/0x710
[ 68.760756] sock_sendmsg+0xdf/0x110
[ 68.760756] __sys_sendto+0x19e/0x270
[ 68.760756] ? __ia32_sys_getpeername+0xa0/0xa0
[ 68.760756] ? fd_install+0x178/0x4c0
[ 68.760756] ? fd_install+0x195/0x4c0
[ 68.760756] ? kernel_fpu_begin_mask+0x1c0/0x1c0
[ 68.760756] __x64_sys_sendto+0xd8/0x1b0
[ 68.760756] ? lockdep_hardirqs_on+0xbf/0x130
[ 68.760756] ? syscall_enter_from_user_mode+0x1d/0x50
[ 68.760756] do_syscall_64+0x3b/0x90
[ 68.760756] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 68.760756] RIP: 0033:0x7f67fb50e6b3
...
[ 68.760756] RSP: 002b:00007f67fa91fe90 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 68.760756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f67fb50e6b3
[ 68.760756] RDX: 000000000000001c RSI: 0000559354603090 RDI: 0000000000000003
[ 68.760756] RBP: 00007f67fa91ff00 R08: 00007f67fa91fedc R09: 000000000000000c
[ 68.760756] R10: 0000000000000000 R11: 0000000000000293 R12: 00007ffe824d496e
[ 68.760756] R13: 00007ffe824d496f R14: 00007f67fa120000 R15: 0000000000000003[ 68.760756] </TASK>
[ 68.760756]
[ 68.760756] Allocated by task 279:
[ 68.760756] kasan_save_stack+0x1e/0x40
[
---truncated--- | []
| null | 7.8 | null | null |
|
GHSA-f48v-f365-33xw | A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account. | []
| null | null | null | null |
|
GHSA-p3v6-vjw3-gr96 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Podamibe Nepal Podamibe Twilio Private Call allows Reflected XSS. This issue affects Podamibe Twilio Private Call: from n/a through 1.0.1. | []
| null | 7.1 | null | null |
|
RHSA-2010:0029 | Red Hat Security Advisory: krb5 security update | krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.2",
"cpe:/o:redhat:rhel_eus:5.3"
]
| null | null | null | null |
GHSA-xr9j-c7v6-7542 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges. | []
| null | 8.8 | null | null |
|
CVE-2021-4119 | Improper Access Control in bookstackapp/bookstack | bookstack is vulnerable to Improper Access Control | [
"cpe:2.3:a:bookstackapp:bookstack:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
GHSA-vc7q-fmv2-m8g3 | Vigybag v1.0 and before is vulnerable to Cross Site Scripting (XSS) via the upload profile picture function under my profile. | []
| null | 5.4 | null | null |
|
CVE-2022-47965 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-rgpp-69xw-mj7q | Multiple cross-site request forgery (CSRF) vulnerabilities in API features in Cisco Unified MeetingPlace 8.6(1.9) allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus95884. | []
| null | null | null | null |
|
GHSA-454m-cf77-vmj9 | A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability are due to a parsing issue on DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. | []
| null | 8.6 | null | null |
|
CVE-2025-0521 | Post SMTP <= 3.0.2 - Unauthenticated Stored Cross-Site Scripting | The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 7.2 | null | null |
GHSA-gjv4-282p-cm98 | In the Linux kernel, the following vulnerability has been resolved:mlxsw: spectrum_acl_tcam: Fix warning during rehashAs previously explained, the rehash delayed work migrates filters from
one region to another. This is done by iterating over all chunks (all
the filters with the same priority) in the region and in each chunk
iterating over all the filters.When the work runs out of credits it stores the current chunk and entry
as markers in the per-work context so that it would know where to resume
the migration from the next time the work is scheduled.Upon error, the chunk marker is reset to NULL, but without resetting the
entry markers despite being relative to it. This can result in migration
being resumed from an entry that does not belong to the chunk being
migrated. In turn, this will eventually lead to a chunk being iterated
over as if it is an entry. Because of how the two structures happen to
be defined, this does not lead to KASAN splats, but to warnings such as
[1].Fix by creating a helper that resets all the markers and call it from
all the places the currently only reset the chunk marker. For good
measures also call it when starting a completely new rehash. Add a
warning to avoid future cases.[1]
WARNING: CPU: 7 PID: 1076 at drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c:407 mlxsw_afk_encode+0x242/0x2f0
Modules linked in:
CPU: 7 PID: 1076 Comm: kworker/7:24 Tainted: G W 6.9.0-rc3-custom-00880-g29e61d91b77b #29
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_afk_encode+0x242/0x2f0
[...]
Call Trace:
<TASK>
mlxsw_sp_acl_atcam_entry_add+0xd9/0x3c0
mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
mlxsw_sp_acl_tcam_vchunk_migrate_all+0x109/0x290
mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x470
process_one_work+0x151/0x370
worker_thread+0x2cb/0x3e0
kthread+0xd0/0x100
ret_from_fork+0x34/0x50
</TASK> | []
| null | 5.5 | null | null |
|
RHSA-2022:0831 | Red Hat Security Advisory: kernel security update | kernel: improper initialization of the "flags" member of the new pipe_buffer | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
]
| null | 7.8 | null | null |
RHSA-2024:4173 | Red Hat Security Advisory: Red Hat build of Cryostat 3.0.0: new RHEL 8 container image security update | bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) | [
"cpe:/a:redhat:cryostat:3::el8"
]
| null | 5.9 | null | null |
GHSA-m4f8-m4jg-vm84 | The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature. | []
| null | null | null | null |
|
CVE-2012-5317 | SQL injection vulnerability in main_bigware_43.php in Bigware Shop before 2.1.5 allows remote attackers to execute arbitrary SQL commands via the lastname parameter in a process action. | [
"cpe:2.3:a:bigware:bigware_shop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bigware:bigware_shop:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-r6rp-cr59-xpm6 | The FiboSearch - AJAX Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.23.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | []
| null | 4.4 | null | null |
|
CVE-2020-14275 | Security vulnerability in HCL Commerce 9.0.0.5 through 9.0.0.13, 9.0.1.0 through 9.0.1.14 and 9.1 through 9.1.4 could allow denial of service, disclosure of user personal data, and performing of unauthorized administrative operations. | [
"cpe:2.3:a:hcltechsw:hcl_commerce:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-r6xq-p57g-7q8p | Static code injection vulnerability in admin.php in sun-jester OpenNews 1.0 allows remote authenticated administrators to inject arbitrary PHP code into config.php via the "Overall Width" field in a setconfig action. | []
| null | null | null | null |
|
GHSA-r7j6-mcqq-8gff | A potential security vulnerability has been identified in HPE OfficeConnect 1820, and 1850 switch series. The vulnerability could be remotely exploited to allow remote directory traversal in HPE OfficeConnect 1820 switch series version PT.02.17 and below, HPE OfficeConnect 1850 switch series version PC.01.23 and below, and HPE OfficeConnect 1850 (10G aggregator) switch version PO.01.22 and below. | []
| null | 7.5 | null | null |
|
CVE-2002-0146 | fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array. | [
"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-33fh-jhp9-q8w6 | Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java. | []
| null | 6.1 | null | null |
|
CVE-2021-34867 | This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3-49160. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in an uncontrolled memory allocation. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13672. | [
"cpe:2.3:a:parallels:parallels:16.1.3-49160:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
GHSA-q3gh-x999-cq66 | Directory traversal vulnerability in scr/soustab.php in openMairie Openfoncier 2.00, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the dsn[phptype] parameter, a related issue to CVE-2007-2069. | []
| null | null | null | null |
|
CVE-2021-3603 | Inclusion of Functionality from Untrusted Control Sphere in PHPMailer/PHPMailer | PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names. | [
"cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
GHSA-g2vw-77f6-mgg5 | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1736, CVE-2015-1737, and CVE-2015-1755. | []
| null | null | null | null |
|
CVE-2007-3444 | The Research in Motion BlackBerry 7270 with 4.0 SP1 Bundle 83 allows remote attackers to cause a denial of service (blocked call reception) via a malformed SIP invite message, possibly related to multiple format string specifiers in the From field, a spoofed source IP address, and limitations of the function stack frame. | [
"cpe:2.3:a:rim:blackberry_software:4.0:sp1_bundle83:*:*:*:*:*:*",
"cpe:2.3:h:rim:blackberry_7270:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-g22h-4p64-r22q | Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013. | []
| null | null | null | null |
|
GHSA-44qp-5pm8-6j8p | An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview. | []
| null | 6.1 | null | null |
|
GHSA-q2mr-4w4q-26x6 | Memory corruption may occur while processing the OIS packet parser. | []
| null | 6.6 | null | null |
|
GHSA-5v96-383f-26hv | PHP remote file inclusion vulnerability in cpg.php in the Coppermine Photo Gallery component (com_cpg) 1.0 and earlier for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | []
| null | null | null | null |
|
GHSA-g389-pjfh-3g4r | IBM Spectrum Protect Backup-Archive Client 7.1 and 8.1 may be vulnerable to a denial of service attack due to a timing issue between client and server TCP/IP communications. IBM X-Force ID: 162477. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.