id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-pp35-5943-78rv
|
A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI.
|
[] | null | null | 6.1 | null |
|
CVE-2022-27405
|
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
|
[
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2024:8339
|
Red Hat Security Advisory: Red Hat Integration Camel K 1.10.8 release and security update.
|
Camel-CassandraQL: Unsafe Deserialization from CassandraAggregationRepository cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:camel_k:1.10.8"
] | null | 8.8 | null | null |
CVE-2015-6302
|
The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419.
|
[
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.250.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.252.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-3010
|
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the rendering engine. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
RHSA-2020:0291
|
Red Hat Security Advisory: fribidi security update
|
fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 7.8 | null |
CVE-2017-6100
|
tcpdf before 6.2.0 uploads files from the server generating PDF-files to an external FTP.
|
[
"cpe:2.3:a:tcpdf_project:tcpdf:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2012-0082
|
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users to affect integrity and availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
CVE-2019-10322
|
A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[
"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 |
|
RHSA-2025:7436
|
Red Hat Security Advisory: libsoup security update
|
libsoup: Integer overflow in append_param_quoted libsoup: Heap buffer overflow in sniff_unknown() libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() libsoup: Out of bounds reads in soup_headers_parse_request() libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.8 | null | null |
CVE-2021-42320
|
Microsoft SharePoint Server Spoofing Vulnerability
|
Microsoft SharePoint Server Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*"
] | null | 8 | null | null |
GHSA-j2hv-f29h-c9g3
|
Windows Common Log File System Driver Information Disclosure Vulnerability.
|
[] | null | 5.5 | null | null |
|
CVE-2017-0173
|
Microsoft Windows 10 1607 and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0215, CVE-2017-0216, CVE-2017-0218, and CVE-2017-0219.
|
[
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 |
|
GHSA-8j3v-gq95-c8m8
|
The Steam Group Viewer WordPress plugin through 2.1 does not sanitise or escape its "Steam Group Address" settings before outputting it in the page, leading to an authenticated Stored Cross-Site Scripting issue
|
[] | null | null | null | null |
|
CVE-2024-7302
|
Blog2Social: Social Media Auto Post & Scheduler <= 7.5.4 - Authenticated (Author+) Stored Cross-Site Scripting via File Upload
|
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 3gp2 file uploads in all versions up to, and including, 7.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the 3gp2 file.
|
[] | null | 6.4 | null | null |
GHSA-v9h7-v369-359m
|
Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team Comments – wpDiscuz.This issue affects Comments – wpDiscuz: from n/a through 7.6.3.
|
[] | null | 2.7 | null | null |
|
CVE-2021-37085
|
There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | 7.1 |
|
ICSA-21-056-04
|
ProSoft Technology ICX35
|
Changing the password on the module webpage does not require the user to type in the current password first. Thus, the password could be changed by a user or external process without knowledge of the current password.CVE-2021-22661 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L).
|
[] | null | null | 8.2 | null |
CVE-2013-7060
|
Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope.
|
[
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jc8x-vpwq-c9g5
|
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the username parameter in the setting/setOpenVpnCertGenerationCfg function.
|
[] | null | 9.8 | null | null |
|
GHSA-cjjq-cwpw-fx4q
|
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
|
[] | null | 7.5 | null | null |
|
GHSA-6hgj-m62w-qp9h
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine.They. The manipulation of the argument name/description with the input <script>alert('2')</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292.
|
[] | null | 6.1 | null | null |
|
CVE-2022-0889
|
The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to reflected cross-site scripting due to missing sanitization of the files filename parameter found in the ~/includes/ajax/controllers/uploads.php file which can be used by unauthenticated attackers to add malicious web scripts to vulnerable WordPress sites, in versions up to and including 3.3.12.
|
[
"cpe:2.3:a:ninjaforms:ninja_forms_file_uploads:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null |
|
CVE-2019-5781
|
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-7f4g-r584-2243
|
Static code injection vulnerability in admin/banners.php in PHP Enter allows remote attackers to inject arbitrary PHP code into horad.php via the code parameter.
|
[] | null | null | null | null |
|
GHSA-hc8p-gq8j-4gjq
|
Multiple cross-site scripting (XSS) vulnerabilities in MagpieRSS 7.1, as used in (a) blogBuddiesv 0.3, (b) Jaws 0.6.2, and possibly other products, allow remote attackers to inject arbitrary web script or HTML via the (1) url parameter to (a) magpie_debug.php and (2) rss_url parameter to (b) magpie_slashbox.php and (c) simple_smarty.php.
|
[] | null | null | null | null |
|
CVE-2021-1236
|
Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability
|
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
|
[
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*"
] | null | null | 4 | null |
GHSA-rgg3-6345-v5q4
|
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
|
[] | null | 5.5 | null | null |
|
CVE-2025-22301
|
WordPress MyBookTable Bookstore by Stormhill Media plugin <= 3.5.3 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross Site Request Forgery.This issue affects MyBookTable Bookstore: from n/a through 3.5.3.
|
[] | null | 5.4 | null | null |
CVE-2017-3795
|
A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to conduct arbitrary password changes against any non-administrative user. More Information: CSCuz03345. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.12.
|
[
"cpe:2.3:a:cisco:webex_meetings_server:2.6.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 6.5 |
|
CVE-2019-19246
|
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
|
[
"cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-mmfm-2hr6-jvqr
|
Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.
|
[] | null | 9.8 | null | null |
|
GHSA-ch6f-2w93-3p64
|
An issue was discovered in Stormshield Network Security (SNS) SNS 4.3.13 through 4.3.22 before 4.3.23, SNS 4.6.0 through 4.6.9 before 4.6.10, and SNS 4.7.0 through 4.7.1 before 4.7.2. An attacker can overflow the cookie threshold, making an IPsec connection impossible.
|
[] | null | 7.5 | null | null |
|
GHSA-9wv8-3h8h-x2wc
|
doctrine/doctrine-module zero-valued authentication credentials vulnerability
|
it is possible (under certain circumstances) to obtain a valid `Zend\Authentication` identity even without knowing the user's credentials by using a numerically valued credential in `DoctrineModule\Authentication\Adapter\ObjectRepository`.
|
[] | null | 6.5 | null | null |
GHSA-8m3m-xj6p-x6fq
|
Multiple SQL injection vulnerabilities in Outfront Spooky Login 2.7 allow remote attackers to execute arbitrary SQL commands via (1) the UserUpdate parameter to login/register.asp or (2) unspecified parameters to includes/a_register.asp.
|
[] | null | null | null | null |
|
CVE-2018-17158
|
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, an integer overflow error can occur when handling the client address length field in an NFSv4 request. Unprivileged remote users with access to the NFS server can crash the system by sending a specially crafted NFSv4 request.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-xxmj-j4pj-fx22
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability.
|
[] | null | 7.5 | null | null |
|
CVE-2006-3420
|
Cross-site request forgery (CSRF) vulnerability in editpost.php in MyBulletinBoard (MyBB) before 1.1.5 allows remote attackers to perform unauthorized actions as a logged in user and delete arbitrary forum posts via a bbcode IMG tag with a modified delete parameter in a deletepost action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-36333
|
Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash.
|
[
"cpe:2.3:a:dell:emc_cloud_link:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2021-34468
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
cisco-sa-rv-stored-xss-LPTQ3EQC
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC"]
|
[] | null | 4.8 | null | null |
CVE-2025-49657
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
|
[] | null | 8.8 | null | null |
GHSA-5qwg-8m23-3p6h
|
A vulnerability has been found in itsourcecode Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /insertPayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null |
|
GHSA-hrfc-4vch-693p
|
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access.
|
[] | null | 6.8 | null | null |
|
CVE-2007-0962
|
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
|
[
"cpe:2.3:h:cisco:firewall_services_module:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2022-34379
|
Dell EMC CloudLink 7.1.2 and all prior versions contain an Authentication Bypass Vulnerability. A remote attacker, with the knowledge of the active directory usernames, could potentially exploit this vulnerability to gain unauthorized access to the system.
|
[
"cpe:2.3:a:dell:cloudlink:*:*:*:*:*:*:*:*"
] | null | 9.4 | null | null |
|
CVE-2021-39986
|
There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-9630
|
WPS Telegram Chat <= 4.5.4 - Missing Authorization to Information Exposure
|
The WPS Telegram Chat plugin for WordPress is vulnerable to authorization bypass due to a missing capability check when accessing messages in versions up to, and including, 4.5.4. This makes it possible for unauthenticated attackers to view the messages that are sent through the Telegram Bot API.
|
[] | null | 5.4 | null | null |
CVE-2022-24923
|
Improper access control vulnerability in Samsung SearchWidget prior to versions 2.3.00.6 in China models allows untrusted applications to load arbitrary URL and local files in webview.
|
[
"cpe:2.3:a:samsung:searchwidget:*:*:*:*:*:*:*:*"
] | null | 4 | null | null |
|
GHSA-7pc7-crj3-6p7v
|
The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago.
|
[] | null | 9.8 | null | null |
|
GHSA-pjrr-rvgc-5w25
|
Rejected reason: Not used
|
[] | null | null | null | null |
|
CVE-2006-3000
|
Cross-site scripting (XSS) vulnerability in search.php in OkScripts OkArticles 1.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter.
|
[
"cpe:2.3:a:okscripts:okarticles:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-39gv-q5r7-jg94
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that was caused by a command that read files from a privileged location and created a system command without sanitizing the read data. This command could be triggered by an attacker remotely to cause code execution and gain a reverse shell in Western Digital My Cloud OS 5 devices.This issue affects My Cloud OS 5: before 5.26.119.
|
[] | null | 8 | null | null |
|
GHSA-mvj6-h82m-cjxf
|
The PPWP – Password Protect Pages plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.9 via API. This makes it possible for unauthenticated attackers to obtain post titles, IDs, slugs as well as other information including for password-protected posts.
|
[] | null | 5.3 | null | null |
|
CVE-2022-42896
|
Info Leak in l2cap_core in the Linux Kernel
|
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 8 | null | null |
CVE-2025-0882
|
code-projects Chat System addnewmember.php sql injection
|
A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-g883-f564-phwg
|
Directory traversal vulnerability in website.php in Web 2 Business (W2B) phpDatingClub (aka Dating Club) 3.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
|
[] | null | null | null | null |
|
cisco-sa-20190501-asa-ftds-ldapdos
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability
|
A vulnerability in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.
The vulnerabilities are due to the improper parsing of LDAP packets sent to an affected device. An attacker could exploit these vulnerabilities by sending a crafted LDAP packet, using Basic Encoding Rules (BER), to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 6.8 | null |
GHSA-m674-4xwc-r94v
|
A remote code execution vulnerability exists in Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8742.
|
[] | null | null | 7.8 | null |
|
GHSA-c95g-5fw2-h647
|
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix the waring dereferencing hiveCheck the amdgpu_hive_info *hive that maybe is NULL.
|
[] | null | 5.5 | null | null |
|
GHSA-q994-gg9f-3g56
|
The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
|
[] | null | null | 6.3 | null |
|
RHSA-2024:5444
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.48 bug fix and security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go-retryablehttp: url might write sensitive information to log file openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses kernel: net: kernel: UAF in network route management
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.8 | null | null |
GHSA-35pg-8ph2-rp9c
|
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
|
[] | null | null | 9.1 | null |
|
GHSA-68qh-2g63-j8vg
|
Windows Win32k Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null |
|
CVE-2021-43554
|
FATEK Automation WinProladder
|
FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.
|
[
"cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2005-4347
|
The Linux 2.4 kernel patch in kernel-patch-vserver before 1.9.5.5 and 2.x before 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows attackers to access files on the host system that are outside of the vserver.
|
[
"cpe:2.3:a:debian:kernel-patch-vserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-37f5-m753-pjhv
|
Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06
|
[] | null | null | null | null |
|
GHSA-xxrc-69rc-659v
|
CuteNews 1.4.1 and possibly other versions allows remote attackers to obtain the installation path via unspecified vectors involving an invalid file path.
|
[] | null | null | null | null |
|
RHSA-2025:7652
|
Red Hat Security Advisory: kernel security update
|
kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt kernel: vsock: Keep the binding until socket destruction
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.8 | null | null |
GHSA-jj28-m5pv-cw58
|
Inedo ProGet before 5.0 Beta5 has CSRF, allowing an attacker to change advanced settings.
|
[] | null | null | 6.5 | null |
|
GHSA-5vwc-px2m-7jxg
|
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
|
[] | null | 7.8 | null | null |
|
GHSA-27j2-98fj-7r5w
|
In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.
|
[] | null | 7.8 | null | null |
|
RHSA-2010:0678
|
Red Hat Security Advisory: rpm security update
|
rpm: fails to drop SUID/SGID bits on package removal rpm: fails to drop SUID/SGID bits on package upgrade
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:5129
|
Red Hat Security Advisory: Openshift Logging security and bug update (5.3.1)
|
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:logging:5.3::el8"
] | null | 8.1 | null | null |
CVE-2021-21607
|
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2017-17051
|
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected.
|
[
"cpe:2.3:a:openstack:nova:16.0.3:*:*:*:*:*:*:*"
] | null | null | 8.6 | 4 |
|
GHSA-wjcc-ppw7-7wf4
|
I, Librarian version <=4.6 & 4.7 is vulnerable to Server-Side Request Forgery in the ajaxsupplement.php resulting in the attacker being able to reset any user's password.
|
[] | null | null | 9.8 | null |
|
CVE-2021-25677
|
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
|
[
"cpe:2.3:o:siemens:simotics_connect_400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotics_connect_400:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_readystart_v4:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_source_code:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2015-5096
|
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5098 and CVE-2015-5105.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-f9rg-wwq3-3cv8
|
In LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
|
[] | null | null | 6.5 | null |
|
CVE-2016-9353
|
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is stored in the system and is encrypted with a static key hard-coded in the program. Attackers could reverse the admin account password for use.
|
[
"cpe:2.3:a:advantech:susiaccess:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
RHSA-2024:8700
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.40 packages and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
GHSA-fg8g-5752-vv79
|
HCL Domino is susceptible to a lockout policy bypass vulnerability in the ID Vault service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the ID Vault service.
|
[] | null | null | null | null |
|
CVE-2022-42117
|
A Cross-site scripting (XSS) vulnerability in the Frontend Taglib module in Liferay Portal 7.3.2 through 7.4.3.16, and Liferay DXP 7.3 before update 6, and 7.4 before update 17 allows remote attackers to inject arbitrary web script or HTML.
|
[
"cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:sp1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:sp2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:sp3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:update_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:update_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:update_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:update_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:update_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:ga1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_10:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_11:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_12:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_13:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_14:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_15:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_16:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_7:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_8:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.4:update_9:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2018-19990
|
In the /HNAP1/SetWiFiVerifyAlpha message, the WPSPIN parameter is vulnerable, and the vulnerability affects D-Link DIR-822 B1 202KRb06 devices. In the SetWiFiVerifyAlpha.php source code, the WPSPIN parameter is saved in the $rphyinf1."/media/wps/enrollee/pin" and $rphyinf2."/media/wps/enrollee/pin" and $rphyinf3."/media/wps/enrollee/pin" internal configuration memory without any regex checking. And in the do_wps function of the wps.php source code, the data in $rphyinf3."/media/wps/enrollee/pin" is used with the wpatalk command without any regex checking. A vulnerable /HNAP1/SetWiFiVerifyAlpha XML message could have shell metacharacters in the WPSPIN element such as the `telnetd` string.
|
[
"cpe:2.3:o:d-link:dir-822_firmware:202krb06:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-6hf7-c47c-6x43
|
The Haier A6 Android device with a build fingerprint of Haier/A6/A6:8.1.0/O11019/1534219877:userdebug/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.1.13). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. In addition to the local attack surface, its accompanying app with a package name of com.ekesoo.lovelyhifonts makes network requests using HTTP and an attacker can perform a Man-in-the-Middle (MITM) attack on the connection to inject a command in a network response that will be executed as the system user by the com.lovelyfont.defcontainer app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.
|
[] | null | null | null | null |
|
CVE-2024-3956
|
Pods – Custom Content Types and Fields <= 3.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Pod Form Redirect URL
|
The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pod Form widget in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null |
CVE-2016-1789
|
Apple iBooks Author before 2.4.1 allows remote attackers to read arbitrary files via an iBooks Author file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[
"cpe:2.3:a:apple:ibooks_author:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-45j8-6hph-65q7
|
Linux implementations of TFTP would allow access to files outside the restricted directory.
|
[] | null | null | null | null |
|
GHSA-q3q4-7rw2-rqpx
|
Denial-of-service in the login page of ASUSTOR ADM 3.1.1 allows attackers to prevent users from signing in by placing malformed text in the title.
|
[] | null | null | 7.5 | null |
|
CVE-2020-0480
|
In callUnchecked of DocumentsProvider.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing a caller to copy, move, or delete files accessible to DocumentsProvider with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157320716
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-9fhr-9xv4-8gjv
|
APfell 1.4 is vulnerable to authenticated reflected cross-site scripting (XSS) in /apiui/command_ through the payloadtypes_callback function, which allows an attacker to steal remote admin/user session and/or adding new users to the administration panel.
|
[] | null | null | null | null |
|
GHSA-hwh3-fhf6-73x9
|
Malicious Package in bictoinjs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
[] | null | 9.1 | null | null |
GHSA-rc49-9xpq-vchg
|
A Server-Side Request Forgery (SSRF) in smarts-srl.com Smart Agent v.1.1.0 allows a remote attacker to obtain sensitive information via a crafted script to the /FB/getFbVideoSource.php component.
|
[] | null | 7.5 | null | null |
|
CVE-2022-46819
|
WordPress Continuous announcement scroller Plugin <= 13.0 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Continuous announcement scroller plugin <= 13.0 versions.
|
[
"cpe:2.3:a:gopiplus:continuous_announcement_scroller:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
cisco-sa-finesse-proxy-dos-vY5dQhrV
|
Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability
|
A vulnerability in the nginx configurations that are provided as part of the VPN-less reverse proxy for Cisco Finesse could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for new and existing users who are connected through a load balancer.
This vulnerability is due to improper IP address filtering by the reverse proxy. An attacker could exploit this vulnerability by sending a series of unauthenticated requests to the reverse proxy. A successful exploit could allow the attacker to cause all current traffic and subsequent requests to the reverse proxy through a load balancer to be dropped, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
|
[] | null | 5.3 | null | null |
CVE-2024-5523
|
SQL injection vulnerability in Astrotalks
|
SQL injection vulnerability in Astrotalks affecting version 10/03/2023. This vulnerability could allow an authenticated local user to send a specially crafted SQL query to the 'searchString' parameter and retrieve all information stored in the database.
|
[
"cpe:2.3:a:astrotalks:astrotalks:03\\/10\\/2023:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-j2v5-x4hx-7vw2
|
The wplegalpages plugin before 1.1 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=legal-pages lp-domain-name, lp-business-name, lp-phone, lp-street, lp-city-state, lp-country, lp-email, lp-address, or lp-niche parameters.
|
[] | null | null | null | null |
|
GHSA-gfw2-4jvh-wgfg
|
AIOHTTP has problems in HTTP parser (the python one, not llhttp)
|
SummaryThe HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling.
This parser is only used when `AIOHTTP_NO_EXTENSIONS` is enabled (or not using a prebuilt wheel).DetailsBug 1: Bad parsing of `Content-Length` valuesDescriptionRFC 9110 says this:`Content-Length = 1*DIGIT`AIOHTTP does not enforce this rule, presumably because of an incorrect usage of the builtin `int` constructor. Because the `int` constructor accepts `+` and `-` prefixes, and digit-separating underscores, using `int` to parse CL values leads AIOHTTP to significant misinterpretation.ExamplesSuggested actionVerify that a `Content-Length` value consists only of ASCII digits before parsing, as the standard requires.Bug 2: Improper handling of NUL, CR, and LF in header valuesDescriptionRFC 9110 says this:Field values containing CR, LF, or NUL characters are invalid and dangerous, due to the varying ways that implementations might parse and interpret those characters; a recipient of CR, LF, or NUL within a field value MUST either reject the message or replace each of those characters with SP before further processing or forwarding of that message.AIOHTTP's HTTP parser does not enforce this rule, and will happily process header values containing these three forbidden characters without replacing them with SP.ExamplesSuggested actionReject all messages with NUL, CR, or LF in a header value. The translation to space thing, while technically allowed, does not seem like a good idea to me.Bug 3: Improper stripping of whitespace before colon in HTTP headersDescriptionRFC 9112 says this:No whitespace is allowed between the field name and colon. In the past, differences in the handling of such whitespace have led to security vulnerabilities in request routing and response handling. A server MUST reject, with a response status code of 400 (Bad Request), any received request message that contains whitespace between a header field name and colon.AIOHTTP does not enforce this rule, and will simply strip any whitespace before the colon in an HTTP header.ExampleSuggested actionReject all messages with whitespace before a colon in a header field, as the standard requires.PoCExample requests are embedded in the previous section. To reproduce these bugs, start an AIOHTTP server without llhttp (i.e. `AIOHTTP_NO_EXTENSIONS=1`) and send the requests given in the previous section. (e.g. by `printf`ing into `nc`)ImpactEach of these bugs can be used for request smuggling.
|
[] | 6.9 | 5.3 | null | null |
CVE-2019-6635
|
On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administrator or the Resource Administrator role can bypass Appliance mode restrictions.
|
[
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | 3.6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.