id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2025:8682
|
Red Hat Security Advisory: grafana security update
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.4 | null | null |
GHSA-8j42-w4ff-mq7x
|
There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).
|
[] | null | null | null | null |
|
CVE-2020-1468
|
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2023-21456
|
Path traversal vulnerability in Galaxy Themes Service prior to SMR Mar-2023 Release 1 allows attacker to access arbitrary file with system uid.
|
[
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] | null | 9 | null | null |
|
GHSA-2pq6-3hcg-wm6x
|
An elevation of privilege vulnerability in the Qualcomm IPA driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33106520. References: QC-CR#1099598.
|
[] | null | null | 7 | null |
|
GHSA-4wg3-58cf-qv2h
|
diag_command.php in pfSense 2.4.4-p3 allows CSRF via the txtCommand or txtRecallBuffer field, as demonstrated by executing OS commands. This occurs because csrf_callback() produces a "CSRF token expired" error and a Try Again button when a CSRF token is missing.
|
[] | null | 8.8 | null | null |
|
CVE-2022-20274
|
In Keyguard, there is a missing permission check. This could lead to local escalation of privilege and prevention of screen timeout with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-206470146
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-646v-pqqm-xw3h
|
Ultimate PHP Board (UPB) 1.9.6 and earlier uses a cryptographically weak block cipher with a large key collision space, which allows remote attackers to determine a suitable decryption key given the plaintext and ciphertext by obtaining the plaintext password, which is sent when logging in, and the ciphertext, which is set in the pass_env cookie.
|
[] | null | null | null | null |
|
GHSA-ghg8-4frh-82h9
|
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 prior to 4.71 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
|
[] | null | null | null | null |
|
GHSA-5cfg-qpjj-28q7
|
Under certain conditions SAP Adaptive Server Enterprise, version 16.0, allows some privileged users to access information which would otherwise be restricted.
|
[] | null | null | 6.5 | null |
|
CVE-2024-23948
|
Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_nodes` function while handling an `ascii`.msh` file.
|
[
"cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
ICSA-23-353-01
|
Subnet Solutions Inc. PowerSYSTEM Center
|
Subnet Solutions PowerSYSTEM Center versions 2020 v5.0.x through 5.16.x contain a vulnerability that could allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.
|
[] | null | null | 7.8 | null |
GHSA-75jq-9pj8-r6gp
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in blazethemes News Kit Elementor Addons allows Stored XSS. This issue affects News Kit Elementor Addons: from n/a through 1.3.1.
|
[] | null | 6.5 | null | null |
|
CVE-2012-3508
|
Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube Webmail 0.8.0 allows remote attackers to inject arbitrary web script or HTML by using "javascript:" in an href attribute in the body of an HTML-formatted email.
|
[
"cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-36q7-4r8c-gcjc
|
Dell PowerStore versions prior to 3.5 contain an improper verification of cryptographic signature vulnerability. An attacker can trick a high privileged user to install a malicious binary by bypassing the existing cryptographic signature checks
|
[] | null | 7.2 | null | null |
|
GHSA-3mp5-8f97-395w
|
ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access.
|
[] | null | null | null | null |
|
CVE-2013-7000
|
The Multimedia Messaging Centre (MMSC) in NowSMS Now SMS & MMS Gateway 2013.09.26 allows remote attackers to cause a denial of service via a malformed message to a MM4 connection.
|
[
"cpe:2.3:a:nowsms:now_sms_\\&_mms_gateway:2013.09.26:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-46411
|
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges.
|
[
"cpe:2.3:a:veritas:access_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_flex_scale_appliance:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-vh7p-jh36-p55r
|
An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service.
|
[] | null | 7.5 | null | null |
|
CVE-2009-4771
|
The PayPal Website Payments Standard functionality in the Ubercart module 5.x before 5.x-1.9 and 6.x before 6.x-2.1 for Drupal does not properly validate orders, which allows remote attackers to trigger unspecified "duplicate actions" via unknown vectors.
|
[
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha6b:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha6c:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha7b:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha7c:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha7d:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha7e:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:5.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-99f8-q7r8-wg7x
|
Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain.
|
[] | null | null | null | null |
|
GHSA-h9jm-c7jx-hrg8
|
The wav_open function in oggenc/audio.c in Xiph.Org vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (memory allocation error) via a crafted wav file.
|
[] | null | 5.5 | null | null |
|
CVE-2025-52938
|
Potential heap-based buffer over-read vulnerability in NotepadNext
|
Out-of-bounds Read vulnerability in dail8859 NotepadNext (src/lua/src modules). This vulnerability is associated with program files lparser.C.
This issue affects NotepadNext: through v0.11.
The singlevar() in lparser.c lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
|
[] | 5.1 | null | null | null |
CVE-2024-27629
|
An issue in dc2niix before v.1.0.20240202 allows a local attacker to execute arbitrary code via the generated file name is not properly escaped and injected into a system call when certain types of compression are used.
|
[
"cpe:2.3:a:rordenlab:dcm2niix:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2016-6418
|
Cross-site scripting (XSS) vulnerability in Cisco Videoscape Distribution Suite Service Manager (VDS-SM) 3.0 through 3.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCva14552.
|
[
"cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:3.4.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-pmqq-7wfv-jfff
|
Apache POI's XLSX2CSV Example XML External Entity (XXE) Vulnerability
|
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[] | null | null | 5.5 | null |
GHSA-jrvr-gmqv-hgrh
|
Subrion CMS is vulnerable to Cross-Site Scripting (XSS)
|
A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS in version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field.
|
[] | null | 6.1 | null | null |
GHSA-579v-mp3v-rrw5
|
jQuery vulnerable to Cross-Site Scripting (XSS)
|
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
|
[] | null | null | null | null |
GHSA-4cgf-47r3-59wr
|
Improper access control vulnerabilities in Samsung Cloud prior to version 5.3.0.32 allows local attackers to access information with Samsung Cloud's privilege via implicit intent.
|
[] | null | 3.3 | null | null |
|
CVE-2025-20906
|
Improper Export of Android Application Components in Settings prior to SMR Feb-2025 Release 1 allows local attackers to enable ADB.
|
[] | null | 5.5 | null | null |
|
GHSA-cv33-mrw3-j8vf
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BZOTheme PrintXtore allows PHP Local File Inclusion. This issue affects PrintXtore: from n/a through 1.7.5.
|
[] | null | 8.1 | null | null |
|
CVE-2022-38189
|
There is a stored cross-site scripting (XSS) vulnerability in ArcGIS API for JavaScript.
|
A stored Cross Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS may allow a remote, authenticated attacker to pass and store malicious strings via crafted queries which when accessed could potentially execute arbitrary JavaScript code in the user’s browser.
|
[
"cpe:2.3:a:esri:portal_for_arcgis:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-8j9v-7cj9-xpfp
|
Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
|
[] | null | null | null | null |
|
GHSA-gq4v-4f65-pcgf
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Semtek Informatics Software Consulting Inc. Semtek Sempos allows SQL Injection.This issue affects Semtek Sempos: through 31072024.
|
[] | 9.2 | 9.8 | null | null |
|
CVE-2013-1129
|
Memory leak in Cisco Unity Connection 9.x allows remote attackers to cause a denial of service (memory consumption and process crash) by sending many TCP requests, aka Bug ID CSCud59736.
|
[
"cpe:2.3:a:cisco:unity_connection:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-1823
|
Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities
|
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
|
[
"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_level_service:3.0\\(0.0.83b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
CVE-2018-12755
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2020-11923
|
An issue was discovered in WiZ Colors A60 1.14.0. API credentials are locally logged.
|
[
"cpe:2.3:a:wizconnected:wiz:1.14.0:*:*:*:*:android:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-4v46-qwhw-4224
|
Windows Kerberos Elevation of Privilege Vulnerability
|
[] | null | 7.5 | null | null |
|
CVE-2022-33733
|
Sensitive information exposure in onCharacteristicRead in Charm by Samsung prior to version 1.2.3 allows attacker to get bluetooth connection information without permission.
|
[
"cpe:2.3:a:samsung:charm:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
CVE-2025-43556
|
Animate | Integer Overflow or Wraparound (CWE-190)
|
Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
GHSA-vj5r-mmp4-3hrx
|
SSL/TLS certificate validation unconditionally disabled by Jenkins NS-ND Integration Performance Publisher Plugin
|
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. Currently, there are no known workarounds or patches.
|
[] | null | 5.9 | null | null |
CVE-2014-5101
|
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php.
|
[
"cpe:2.3:a:webidsupport:webid:1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8h83-chh2-fchp
|
eZ Platform users with the Company admin role can assign any role to any user
|
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.The role / assign policy is typically only given to administrators, which limits the scope in most cases, but please verify who has this policy in your installaton. The fix ensures that subtree limitations are working as intended.
|
[] | null | null | null | null |
GHSA-3rqf-wg29-9x59
|
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the pass parameter in the setting/setOpenVpnCfg function.
|
[] | null | 9.8 | null | null |
|
GHSA-f5j2-5xm6-3xw5
|
Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user's approval and obtain video and audio data from a device via a crafted web site.
|
[] | null | 6.5 | null | null |
|
GHSA-p3gj-wq33-qg67
|
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
|
[] | null | null | 9.8 | null |
|
CVE-2023-35050
|
WordPress Elementor Pro plugin <= 3.13.0 - Auth. Broken Access Control vulnerability
|
Missing Authorization vulnerability in Elementor Elementor Pro.This issue affects Elementor Pro: from n/a through 3.13.0.
|
[
"cpe:2.3:a:elementor:elementor_pro:-:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-mr7p-25v2-35wr
|
NLTK Vulnerable To Path Traversal
|
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a `../` (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
|
[] | 8.7 | null | 7.5 | null |
CVE-2022-3411
|
A lack of length validation in GitLab CE/EE affecting all versions from 12.4 before 15.6.7, 15.7 before 15.7.6, and 15.8 before 15.8.1 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-jv9r-h7r8-3459
|
sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
|
[] | null | null | null | null |
|
GHSA-v4x4-2fqj-xpmh
|
Insecure method vulnerability in Awingsoft Awakening Winds3D Viewer plugin 3.5.0.0, 3.0.0.5, and possibly other versions allows remote attackers to force the download and execution of arbitrary files via the GetURL method.
|
[] | null | null | null | null |
|
GHSA-7mw2-m38p-22r4
|
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
|
[] | null | 9.8 | null | null |
|
GHSA-8f7f-vqg5-jrv9
|
.NET Denial of Service Vulnerability
|
Microsoft Security Advisory CVE-2023-21538: .NET Denial of Service Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A denial of service vulnerability exists in .NET 6.0 where a malicious client could cause a stack overflow which may result in a denial of service attack when an attacker sends an invalid request to an exposed endpoint.DiscussionDiscussion for this issue can be found at https://github.com/dotnet/runtime/issues/80449<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 6.0 application running on .NET 6.0.12 or earlier.If your application uses the following package versions, ensure you update to the latest version of .NET.<a name=".NET 6"></a>.NET 6Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.12|6.0.13Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 6.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you are using one of the affected packages, please update to the patched version listed above.If you're using .NET 6.0, you should download and install Runtime 6.0.13 or SDK 6.0.113 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0..NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2023-21538]( https://www.cve.org/CVERecord?id=CVE-2023-21538)RevisionsV1.0 (January 10, 2023): Advisory published._Version 1.0__Last Updated 2023-01-10_
|
[] | null | 7.5 | null | null |
CVE-2021-20196
|
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:a:qemu:qemu:5.2.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.1 |
|
CVE-2007-1679
|
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware Webmail 1.0 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors in (1) imp/search.php and (2) ingo/rule.php. NOTE: this issue has been disputed by the vendor, noting that the search.php issue was resolved in CVE-2006-4255, and attackers can only use rule.php to inject XSS into their own pages
|
[
"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 4.3 |
|
GHSA-mpv4-mv92-pcjg
|
CodeAstro MembershipM-PHP (aka Membership Management System in PHP) 1.0 allows add_members.php fullname stored XSS.
|
[] | null | 5.4 | null | null |
|
CVE-2023-37497
|
An XML External Entity (XXE) Injection Vulnerability affects HCL Unica Platform
|
The Unica application exposes an API which accepts arbitrary XML input. By manipulating the given XML, an authenticated attacker with certain rights can successfully perform XML External Entity attacks (XXE) against the backend service.
|
[
"cpe:2.3:a:hcltech:unica:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
ICSA-21-334-02
|
Mitsubishi Electric MELSEC and MELIPC Series (Update G)
|
The product does not properly control the allocation and maintenance of a limited resource, and could thereby enable an actor to influence resource consumption, eventually leading to the exhaustion of available resources. The product parses a formatted message or structure, but does not handle or incorrectly handles a length field inconsistent with the actual length of the associated data. The product receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.
|
[] | null | null | 7.5 | null |
GHSA-g68p-rgrw-xp3p
|
Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
|
[] | null | null | null | null |
|
CVE-2018-13836
|
An integer overflow vulnerability exists in the function multiTransfer of Rocket Coin (XRC), an Ethereum token smart contract. An attacker could use it to set any user's balance.
|
[
"cpe:2.3:a:rocket_coin_project:rocket_coin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-2634
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:xp_command_view:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
] | null | 6.8 | null | 4.3 |
|
GHSA-pgmf-hqhq-5mq3
|
Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the sendnum parameter of the ping function.
|
[] | null | 7.2 | null | null |
|
CVE-2015-8879
|
The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-578c-38fg-wf3m
|
The getdirective function in mathtex.cgi in mathTeX, when downloaded before 20090713, allows remote attackers to execute arbitrary commands via shell metacharacters in the dpi tag.
|
[] | null | null | null | null |
|
CVE-2003-1377
|
Buffer overflow in the reverse DNS lookup of Smart IRC Daemon (SIRCD) 0.4.0 and 0.4.4 allows remote attackers to execute arbitrary code via a client with a long hostname.
|
[
"cpe:2.3:a:sircd:sircd:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sircd:sircd:0.4.4:*:*:*:*:*:*:*"
] | null | null | null | 8.3 |
|
CVE-2020-14880
|
Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher. While the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 8.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence_publisher:5.5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
|
GHSA-jpq5-g9cr-9hpq
|
Unspecified vulnerability in HP OneView 1.0 and 1.01 allows remote authenticated users to gain privileges via unknown vectors.
|
[] | null | null | null | null |
|
CVE-2024-41372
|
Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/settyping.php.
|
[
"cpe:2.3:a:causefx:organizr:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2018-15403
|
Multiple Cisco Unified Communications Products Open Redirect Vulnerability
|
A vulnerability in the web interface of Cisco Emergency Responder, Cisco Unified Communications Manager, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an authenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by crafting an HTTP request that causes the web interface to redirect a request to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
|
[
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.1\\(1\\)es23:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:10.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:10.5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:12.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:12.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:emergency_responder:11.5\\(4.59000.1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:emergency_responder:12.0\\(1.40000.3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:emergency_responder:12.5\\(0.98000.110\\):*:*:*:*:*:*:*"
] | null | null | 5.4 | 4.9 |
GHSA-w63f-q474-3fj3
|
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
|
[] | null | null | null | null |
|
GHSA-9hfh-cfr9-wjqm
|
IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208345.
|
[] | null | 5.4 | null | null |
|
GHSA-2665-5qhw-p224
|
A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in FAST LTA Silent Brick WebUI, allowing attackers to inject malicious JavaScript code into web pages viewed by users. This issue arises when user-supplied input is improperly handled and reflected directly in the output of a web page without proper sanitization or encoding. Exploiting this vulnerability, an attacker can execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, and other malicious actions. Affected WebUI parameters are "h", "hd", "p", "pi", "s", "t", "x", "y".
|
[] | 5.1 | null | null | null |
|
CVE-2020-5890
|
On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1 and BIG-IQ 5.2.0-7.1.0, when creating a QKView, credentials for binding to LDAP servers used for remote authentication of the BIG-IP administrative interface will not fully obfuscate if they contain whitespace.
|
[
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2021-38641
|
Microsoft Edge for Android Spoofing Vulnerability
|
Microsoft Edge for Android Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-r6rq-ppp9-f5c4
|
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset.
|
[] | null | 9.8 | null | null |
|
GHSA-h52q-725p-338m
|
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
|
[] | null | null | null | null |
|
CVE-2006-6418
|
Buffer overflow in the POSIX Threads library (libpthread) on HP Tru64 UNIX 4.0F PK8, 4.0G PK4, and 5.1A PK6 allows local users to gain root privileges via a long PTHREAD_CONFIG environment variable.
|
[
"cpe:2.3:o:hp:tru64:4.0f:pk8:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:4.0g:pk4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2021-26971
|
A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities in the AirWave web-base management interface could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system leading to partial system compromise.
|
[
"cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | 6.5 |
|
CVE-2019-16255
|
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
|
[
"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm:19.3.0.2:*:*:*:enterprise:*:*:*"
] | null | 8.1 | null | 6.8 |
|
CVE-2006-6910
|
formbankcgi.exe in Fersch Formbankserver 1.9, when the PATH_INFO begins with Abfrage, allows remote attackers to cause a denial of service (daemon crash) via multiple requests containing many /../ sequences in the Name parameter.
|
[
"cpe:2.3:a:fersch:formbankserver:1.9:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2024-38859
|
XSS in view page with SLA column
|
XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users.
|
[
"cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*"
] | 4.8 | null | null | null |
GHSA-w88q-5f6g-pfcv
|
SQL injection vulnerability in search.php for phpBB 1.0 through 2.0.6 allows remote attackers to execute arbitrary SQL and gain privileges via the search_results parameter.
|
[] | null | null | null | null |
|
GHSA-vmcm-fv4m-prc7
|
The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
|
[] | null | 9.8 | null | null |
|
GHSA-j664-pgf6-rhhh
|
A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query.
|
[] | null | null | null | null |
|
GHSA-wfr5-r44x-fgpg
|
Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find().
|
[] | null | 9.8 | null | null |
|
CVE-2008-6086
|
SQL injection vulnerability in album.php in Camera Life 2.6.2b4 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2008-3355.
|
[
"cpe:2.3:a:camera_life:camera_life:2.6.2b4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-25wx-2r9g-p2hv
|
In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 6.7 | null | null |
|
CVE-2025-6845
|
code-projects Simple Forum register1.php sql injection
|
A vulnerability was found in code-projects Simple Forum 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /register1.php. The manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2023-30852
|
Pimcore Arbitrary File Read in Admin JS CSS files
|
Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the "scriptPath" parameter and the file name in the "scripts" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual.
|
[
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
ICSA-17-129-02
|
Siemens PROFINET DCP (Update V)
|
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected. Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
|
[] | null | 6.5 | null | null |
CVE-2022-4304
|
Timing Oracle in RSA Decryption
|
A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:sslvpn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2008-6913
|
Unrestricted file upload vulnerability in editresume_next.php in Zeeways ZEEJOBSITE 2.0 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension as a photo in a profile edit action, then accessing the file via a direct request to jobseekers/logos/.
|
[
"cpe:2.3:a:zeeways:zeejobsite:2.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-h5mw-6qwr-qv2x
|
The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
|
[] | null | 7.5 | null | null |
|
CVE-2022-2418
|
URVE Web Manager img_upload.php unrestricted upload
|
A vulnerability was found in URVE Web Manager. It has been classified as critical. This affects an unknown part of the file kreator.html5/img_upload.php. The manipulation leads to unrestricted upload. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:eveo:urve_web_manager:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
GHSA-48h6-xg8f-qv46
|
Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TCM 4351B installed on Tricon V11.3.x systems that could cause module reset when TCM receives malformed TriStation packets while the write-protect keyswitch is in the program position.
|
[] | null | null | null | null |
|
GHSA-j6m6-gq73-6859
|
The The Anps Theme plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.1.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[] | null | 6.5 | null | null |
|
CVE-2010-0551
|
HTTP authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier allows remote attackers to read authentication headers of other users via a large request with an incorrect authentication attempt, which includes sensitive memory in the response. NOTE: this is referred to as a "memory leak" by some sources, but is better characterized as "memory disclosure."
|
[
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:1.4.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-5240
|
PHP remote file inclusion vulnerability in engine/require.php in Docmint 2.0 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the MY_ENV[BASE_ENGINE_LOC] parameter.
|
[
"cpe:2.3:a:docmint:docmint_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2024-2173
|
Out of bounds memory access in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.