id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2014-5071 | SQL injection vulnerability in the checkPassword function in Symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary SQL commands via vectors involving a username. | [
"cpe:2.3:o:microsemi:s350i_firmware:2.70.15:*:*:*:*:*:*:*",
"cpe:2.3:h:microsemi:s350i:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-41056 | firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files | In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
Use strnlen() instead of strlen() on the algorithm and coefficient name
string arrays in V1 wmfw files.
In V1 wmfw files the name is a NUL-terminated string in a fixed-size
array. cs_dsp should protect against overrunning the array if the NUL
terminator is missing. | [] | null | null | null | null |
CVE-2011-1119 | Google Chrome before 9.0.597.107 does not properly determine device orientation, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-9800 | Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-9xh4-wpx8-rg2w | MoinMoin Improper Privilege Management | MoinMoin 1.2.2 and earlier could allow a remote attacker to gain elevated privileges, caused by an undisclosed Access Control List (ACL) vulnerability in the PageEditor. | [] | null | null | null | null |
CVE-2023-1540 | Observable Response Discrepancy in answerdev/answer | Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6. | [
"cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
CVE-2024-56113 | Smart Toilet Lab - Motius 1.3.11 is running with debug mode turned on (DEBUG = True) and exposing sensitive information defined in Django settings file through verbose error page. | [] | null | 7.5 | null | null |
|
CVE-2013-3525 | SQL injection vulnerability in Approvals/ in Request Tracker (RT) 4.0.10 and earlier allows remote attackers to execute arbitrary SQL commands via the ShowPending parameter. NOTE: the vendor disputes this issue, stating "We were unable to replicate it, and the individual that reported it retracted their report," and "we had verified that the claimed exploit did not function according to the author's claims. | [
"cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-3968 | An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot. | [
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc1:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc2:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc3:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2014.07:rc1:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2014.07:rc2:*:*:*:*:*:*"
] | null | null | 8.2 | null |
|
RHBA-2020:0675 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.5 packages update | jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 3.1 | null | null |
GHSA-wwgp-h574-hhfx | Multiple cross-site scripting (XSS) vulnerabilities in Askbot before 0.7.49 allow remote attackers to inject arbitrary web script or HTML via vectors related to the (1) tag or (2) user search forms. | [] | null | null | null | null |
|
GHSA-9xr7-249c-rcpj | Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak. | [] | null | 6.2 | null | null |
|
GHSA-m4fw-6g2w-g44w | When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only. | [] | null | null | null | null |
|
GHSA-qff2-8qw7-hcvw | Apache Inlong Code Injection vulnerability | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.10.0 through 1.12.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.13.0 or cherry-pick [1] to solve it.[1] https://github.com/apache/inlong/pull/10251 | [] | 7.2 | 7.6 | null | null |
RHSA-2019:2995 | Red Hat Security Advisory: Red Hat A-MQ Broker 7.5 release and security update | 1: Class Loader manipulation via request parameters | [
"cpe:/a:redhat:amq_broker:7"
] | null | null | null | null |
GHSA-8vqv-gv6p-pjjr | A heap based buffer overflow vulnerability exists in tile decoding code of TIFF image parser in OpenImageIO master-branch-9aeece7a and v2.3.19.0. A specially-crafted TIFF file can lead to an out of bounds memory corruption, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-4x9c-4g9p-35rm | It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue. | [] | null | null | null | null |
|
GHSA-3g8v-5492-gcv4 | Multiple SQL injection vulnerabilities in yonetici.asp in Berthanas Ziyaretci Defteri 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) user and (2) Pass fields. | [] | null | null | null | null |
|
GHSA-jv7h-2pm2-q7mr | Appointment Scheduler 3.0 is vulnerable to CSV Injection via a Language > Labels > Export action. | [] | null | 8.8 | null | null |
|
RHSA-2024:9885 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser | [
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
] | null | 7.5 | null | null |
GHSA-8c6f-pqm5-8585 | BitComet Service for Windows before version 1.8.6 contains an unquoted service path vulnerability which allows attackers to escalate privileges to the system level. | [] | null | 7.8 | null | null |
|
GHSA-hphx-5q42-588c | Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22007. | [] | null | null | 7.8 | null |
|
CVE-2024-35116 | IBM MQ denial of service | IBM MQ 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, and 9.3 CD is vulnerable to a denial of service attack caused by an error applying configuration changes. IBM X-Force ID: 290335. | [
"cpe:2.3:a:ibm:mq_appliance:9.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*"
] | null | 5.9 | null | null |
CVE-2003-0475 | Directory traversal vulnerability in iWeb Server 2 allows remote attackers to read arbitrary files via an HTTP request containing URL-encoded .. sequences ("%5c%2e%2e"), a different vulnerability than CVE-2003-0474. | [
"cpe:2.3:a:ashley_brown:iweb_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-x788-5vx8-9q9h | Cross-site scripting (XSS) vulnerability in the Web Dorado Spider Video Player (aka WordPress Video Player) plugin before 1.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-vcr4-xgv5-xwf2 | Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192. | [] | null | null | null | null |
|
GHSA-mcx4-f5f5-4859 | Prevent cache poisoning via a Response Content-Type header in Symfony | DescriptionWhen a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format is not the right one.ResolutionSymfony does not use the `Accept` header anymore to guess the `Content-Type`.The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6) for the 4.4 branch.CreditsI would like to thank Xavier Lacot from JoliCode for reporting & Yonel Ceruto and Tobias Schultze for fixing the issue. | [] | null | 2.6 | null | null |
CVE-2018-11185 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 43 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-669r-j85h-hf68 | Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability." | [] | null | null | null | null |
|
ICSA-22-146-02 | Horner Automation Cscape Csfont | The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.CVE-2022-27184 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code.CVE-2022-28690 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code.CVE-2022-29488 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code.CVE-2022-30540 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2021-42583 | A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information. | [
"cpe:2.3:a:foxcpp:maddy:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-9592-7844-9gm7 | IBM Jazz Foundation and IBM Engineering products are vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 194597. | [] | null | null | null | null |
|
CVE-2024-21243 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] | null | 2.2 | null | null |
|
GHSA-j784-xw9c-263h | CuppaCMS v1.0 was discovered to contain a SQL injection vulnerability via the menu_filter parameter at /administrator/templates/default/html/windows/right.php. | [] | null | 9.8 | null | null |
|
CVE-2003-0895 | Buffer overflow in the Mac OS X kernel 10.2.8 and earlier allows local users, and possibly remote attackers, to cause a denial of service (crash), access portions of memory, and possibly execute arbitrary code via a long command line argument (argv[]). | [
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-4f72-53xg-j632 | The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to bypass the Same Origin Policy via a web page that is visited in Internet Explorer, aka "MSXML Information Disclosure Vulnerability." | [] | null | null | null | null |
|
GHSA-m2hj-xmpv-m3qq | IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname function. | [] | null | 7.8 | null | null |
|
CVE-2014-125026 | Out-of-bounds write in github.com/cloudflare/golz4 | LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. | [
"cpe:2.3:a:cloudflare:golz4:*:*:*:*:*:go:*:*"
] | null | 9.8 | null | null |
GHSA-m22p-rxw5-75fw | A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter. | [] | null | 6.1 | null | null |
|
GHSA-gg8h-m8r7-m49p | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
GHSA-pvc4-2h26-6hch | The cross-site scripting (XSS) protection mechanism in ShowInContentAreaAction.do in ManageEngine Password Manager Pro (PMP) before 6.1 Build 6104 uses case-sensitive checks for malicious inputs, which allows remote attackers to inject arbitrary web script or HTML via the searchtext parameter and other unspecified inputs. | [] | null | null | null | null |
|
CVE-2024-37779 | WoodWing Elvis DAM v6.98.1 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the Apache Ant script functionality. | [
"cpe:2.3:a:woodwing_elvis_dam:woodwing_elvis_dam:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-2gmw-j4qh-8xwv | Directory traversal vulnerability in rss.php in fuzzylime (cms) 3.01a and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter, as demonstrated using content.php, a different vector than CVE-2007-4805. | [] | null | null | null | null |
|
RHSA-2019:2694 | Red Hat Security Advisory: firefox security update | Mozilla: Sandbox escape through Firefox Sync firefox: stored passwords in 'Saved Logins' can be copied without master password entry Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images Mozilla: Cross-origin access to unload event attributes Mozilla: XSS by breaking out of title and textarea elements using innerHTML Mozilla: Use-after-free while manipulating video Mozilla: Use-after-free while extracting a key value in IndexedDB | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
GHSA-2vm6-24x2-fw9m | There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with. | [] | null | 5.3 | null | null |
|
GHSA-c3j4-p4mf-9hj3 | An issue has been discovered in GitLab CE/EE affecting all versions starting with version 8.10. It was possible to trigger a timeout on a page with markdown by using a specific amount of block-quotes. | [] | null | 4.3 | null | null |
|
CVE-2006-1560 | Multiple SQL injection vulnerabilities in SkinTech phpNewsManager 1.48 allow remote attackers to execute arbitrary SQL commands via unspecified parameters, possibly (1) id and (2) topicid, in (a) browse.php, (b) category.php, (c) gallery.php, (d) poll.php, and (e) possibly other unspecified scripts. NOTE: portions of the description details are obtained from third party information. | [
"cpe:2.3:a:skintech:phpnewsmanager:1.48:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-27519 | Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM. | [
"cpe:2.3:a:pritunl:pritunl-client-electron:1.2.2550.20:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-q89m-78v7-wxvj | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users. | [] | null | null | null | null |
|
GHSA-9266-j9v3-q4j5 | Couchbase Sync Gateway admin credentials not verified when using X.509 client cert authentication | An issue was discovered in Couchbase Sync Gateway 3.x before 3.0.2. Admin credentials are not verified when using X.509 client-certificate authentication from Sync Gateway to Couchbase Server. When Sync Gateway is configured to authenticate with Couchbase Server using X.509 client certificates, the admin credentials provided to the Admin REST API are ignored, resulting in privilege escalation for unauthenticated users. The Public REST API is not impacted by this issue. A workaround is to replace X.509 certificate based authentication with Username and Password authentication inside the bootstrap configuration. | [] | 9.3 | 9.8 | null | null |
GHSA-mx42-hfvg-9v66 | Unspecified vulnerability in the H.323 implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 2.5.x before 2.5.2 and 2.6.x before 2.6.1, allows remote attackers to cause a denial of service (device reload) via crafted H.323 packets, aka Bug ID CSCtc73759. | [] | null | null | null | null |
|
GHSA-jpg6-jwqc-47r4 | A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pages/transaction_update.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-v3fw-mj9c-qq7m | SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist. | [] | null | null | null | null |
|
CVE-2010-0798 | SQL injection vulnerability in the T3BLOG extension 0.6.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:snowflake:t3blog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:snowflake:t3blog:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:snowflake:t3blog:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:snowflake:t3blog:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2024:7847 | Red Hat Security Advisory: openssl security update | openssl: SSL_select_next_proto buffer overread | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | null | 5.9 | null |
CVE-2021-37441 | NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring. | [
"cpe:2.3:a:nch:axon_pbx:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2017-0892 | Nextcloud Server before 11.0.3 is vulnerable to an improper session handling allowed an application specific password without permission to the files access to the users file. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | 4.3 |
|
GHSA-5jxp-5vrv-qmg9 | netgear R6250 Firmware Version 1.0.4.48 is vulnerable to Buffer Overflow after authentication. | [] | null | 9.8 | null | null |
|
CVE-2013-4401 | The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
GHSA-3fjc-xv2v-jr9v | Vulnerability in administration server for HP VirtualVault 4.5 on HP-UX 11.04 allows remote web servers or privileged external processes to bypass access restrictions and establish connections to the server. | [] | null | null | null | null |
|
GHSA-g2cf-q8fg-whrr | In the Linux kernel, the following vulnerability has been resolved:smb: client: guarantee refcounted children from parent sessionAvoid potential use-after-free bugs when walking DFS referrals,
mounting and performing DFS failover by ensuring that all children
from parent @tcon->ses are also refcounted. They're all needed across
the entire DFS mount. Get rid of @tcon->dfs_ses_list while we're at
it, too. | [] | null | 8.4 | null | null |
|
CVE-2023-5291 | The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'AWL-BlogFilter' shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:awplife:blog_filter:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
GHSA-qpxw-x8ww-vwg7 | A Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter. | [] | null | 6.1 | null | null |
|
GHSA-3mf5-jc6x-rp7q | The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface." | [] | null | null | null | null |
|
GHSA-g78g-3mc4-6p43 | The Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to an improper capability check on 42 separate AJAX functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with subscriber access and above, to fully control the plugin which includes the ability to modify plugin settings and profiles, and create, edit, retrieve, and delete templates and barcodes. | [] | null | 6.3 | null | null |
|
GHSA-29f7-44gf-pv93 | Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg. | [] | null | null | null | null |
|
RHSA-2018:0152 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: local privesc in key management kernel: keyctl_set_reqkey_keyring() leaks thread keyrings kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation kernel: Use-after-free in the af_packet.c | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
CVE-2022-40986 | Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the '(ddns1|ddns2) mx WORD' command template. | [
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
GHSA-qvcw-45h8-6h3w | AcroRd32.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image that triggers an incorrect pointer calculation, leading to heap memory corruption, a different vulnerability than CVE-2011-0566 and CVE-2011-0603. | [] | null | null | null | null |
|
GHSA-wmwf-49vv-p3mr | Sulu Observable Response Discrepancy on Admin Login | ImpactIt allows over the Admin Login form to detect which user (username, email) exists and which one do not exist.Impacted by this issue are Sulu installation >= 2.5.0 and <2.5.10 using the newer Symfony Security System which is default since Symfony 6.0 but can be enabled in Symfony 5.4. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue.PatchesThe problem has been patched in version 2.5.10.WorkaroundsCreate a custom AuthenticationFailureHandler which does not return the `$exception->getMessage();` instead the `$exception->getMessageKey();`ReferencesCurrently no references. | [] | null | 4.3 | null | null |
RHSA-2003:091 | Red Hat Security Advisory: : Updated kerberos packages fix various vulnerabilities | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
CVE-2021-21902 | An authentication bypass vulnerability exists in the CMA run_server_6877 functionality of Garrett Metal Detectors iC Module CMA Version 5.0. A properly-timed network connection can lead to authentication bypass via session hijacking. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:o:garrett:ic_module_cma:5.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-7fgx-pmw9-49h5 | A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to arbitrary code execution. | [] | null | 9.1 | null | null |
|
RHSA-2013:0639 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
GHSA-7w65-667q-9p5w | Buffer overflow can occur while processing clip due to lack of check of object size before parsing in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, Nicobar, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM8150, SM8250, SXR1130, SXR2130 | [] | null | null | null | null |
|
CVE-2010-2594 | Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port. | [
"cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:0.9.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_epilog:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:intersect_alliance:snare_agent:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-5v43-7w6q-mpph | Cross-site scripting (XSS) vulnerability in index.php in JV2 Folder Gallery 3.1 allows remote attackers to inject arbitrary web script or HTML via the image parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-66ww-999q-mffq | Arbitrary code execution in post-loader | post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available. | [] | null | 9.8 | null | null |
GHSA-3rcv-jmj4-w65f | In NOKIA NFM-T R19.9, a SQL Injection vulnerability occurs in /cgi-bin/R19.9/easy1350.pl of the VM Manager WebUI via the id or host HTTP GET parameter. An authenticated attacker is required for exploitation. | [] | null | 8.8 | null | null |
|
CVE-2015-8217 | The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-1000451 | fs-git is a file system like api for git repository. The fs-git version 1.0.1 module relies on child_process.exec, however, the buildCommand method used to construct exec strings does not properly sanitize data and is vulnerable to command injection across all methods that use it and call exec. | [
"cpe:2.3:a:fs-git_project:fs-git:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2023-25881 | ZDI-CAN-19390: Adobe Dimension OBJ File Improper Input Validation Remote Code Execution | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2018-20225 | An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely | [
"cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2014-0329 | The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password. | [
"cpe:2.3:h:zte:zxv10_w300:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-7xp3-x8jx-64xq | The RealAudio codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, Mac RealPlayer 11.0 through 12.0.0.1444, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted audio stream in a RealMedia file. | [] | null | null | null | null |
|
GHSA-whm8-436x-pvrj | In the Linux kernel, the following vulnerability has been resolved:riscv: process: fix kernel info leakagethread_struct's s[12] may contain random kernel memory content, which
may be finally leaked to userspace. This is a security hole. Fix it
by clearing the s[12] array in thread_struct when fork.As for kthread case, it's better to clear the s[12] array as well. | [] | null | null | null | null |
|
CVE-2024-35769 | WordPress Slideshow SE plugin <= 2.5.17 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in John West Slideshow SE allows Stored XSS.This issue affects Slideshow SE: from n/a through 2.5.17. | [
"cpe:2.3:a:slideshow_se_project:slideshow_se:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-99v4-pprm-ghh2 | A vulnerability, which was classified as problematic, has been found in vicamo NetworkManager. Affected by this issue is the function send_arps of the file src/devices/nm-device.c. The manipulation leads to unchecked return value. The name of the patch is 4da19b89815cbf6e063e39bc33c04fe4b3f789df. It is recommended to apply a patch to fix this issue. VDB-217514 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2022-20427 | In (TBD) of (TBD), there is a possible way to corrupt memory due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555070References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2006-4710 | Multiple cross-site scripting (XSS) vulnerabilities in NewsGator FeedDemon before 2.0.0.25 allow remote attackers to inject arbitrary web script or HTML via an Atom 1.0 feed, as demonstrated by certain test cases of the James M. Snell Atom 1.0 feed reader test suite. | [
"cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-29723 | The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack. | [
"cpe:2.3:a:glitter_unicorn_wallpaper_project:glitter_unicorn_wallpaper:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | null |
|
CVE-2021-24786 | Download Monitor < 4.4.5 - Admin+ SQL Injection | The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue | [
"cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 |
RHSA-2021:0882 | Red Hat Security Advisory: tomcat security update | tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 4.3 | null | null |
GHSA-5vq8-pmhc-c7q2 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd g_b, at 0x9d015a8c, the value for the `val` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [] | null | 8.1 | null | null |
|
GHSA-hg7c-66ff-9q8g | Sandbox bypass in constantinople | constantinople before 3.1.1 affected by a sandbox bypass. | [] | null | null | null | null |
CVE-2023-28732 | Missing access control affecting the AcyMailing plugin for Joomla | Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office.
This issue affects AnyMailing Joomla Plugin in versions below 8.3.0.
| [
"cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:joomla\\!:*:*"
] | null | 6.5 | null | null |
GHSA-6chg-8whj-347g | A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with network access to the Application Server could cause a Denial-of-Service condition by sending specifically crafted objects via RMI. This vulnerability is independent from CVE-2019-18317 and CVE-2019-18318. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2001-0822 | FPF kernel module 1.0 allows a remote attacker to cause a denial of service via fragmented packets. | [
"cpe:2.3:a:packet_knights:fpf_linux_kernel_module:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2020:3519 | Red Hat Security Advisory: OpenShift Container Platform 4.5.7 jenkins and openshift packages security update | jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links kubernetes: Node disk DOS by writing to container /etc/hosts | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.5 | null | null |
CVE-2012-0068 | The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell capture file containing a record that is too small. | [
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.