id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-rm7g-xfrp-h3v4 | Multiple format string vulnerabilities in xiTK (xitk/main.c) in xine 0.99.4 might allow attackers to cause a denial of service via format string specifiers in an MP3 filename specified on the command line. NOTE: this is a different vulnerability than CVE-2006-1905. In addition, if the only attack vectors involve a user-assisted, local command line argument of a non-setuid program, this issue might not be a vulnerability. | [] | null | null | null | null |
|
GHSA-pr99-p5f4-p6f9 | kextd in kext tools in Apple OS X before 10.10.4 allows attackers to write to arbitrary files via a crafted app that conducts a symlink attack. | [] | null | null | null | null |
|
GHSA-f527-6p69-g47f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Concerted Action Action Network allows Reflected XSS.This issue affects Action Network: from n/a through 1.4.2. | [] | null | 7.1 | null | null |
|
CVE-2024-21914 | Rockwell Automation - FactoryTalk® View ME on PanelView™ Plus 7 Boot Terminal lack Security Protections |
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or control of the PanelView™ product.
| [
"cpe:2.3:a:rockwellautomation:factorytalk_view_me:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2023-40893 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet. | [
"cpe:2.3:h:tenda:ac8v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac8v4_firmware:16.03.34.06:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2025-32107 | OS command injection vulnerability exists in Deco BE65 Pro firmware versions prior to "Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123". If this vulnerability is exploited, an arbitrary OS command may be executed by the user who can log in to the device. | [] | null | null | 8 | null |
|
GHSA-72h8-x8gh-6pw7 | Multiple format string vulnerabilities in the tolog function in httpdx 1.4, 1.4.5, 1.4.6, 1.4.6b, and 1.5 allow (1) remote attackers to execute arbitrary code via format string specifiers in a GET request to the HTTP server component when logging is enabled, and allow (2) remote authenticated users to execute arbitrary code via format string specifiers in a PWD command to the FTP server component. | [] | null | null | null | null |
|
GHSA-9x2h-m2w5-qq73 | The WooCommerce Multivendor Marketplace – REST API plugin for WordPress is vulnerable to unauthorized access of data and addition of data due to a missing capability check on the 'get_item', 'get_order_notes' and 'add_order_note' functions in versions up to, and including, 1.5.3. This makes it possible for authenticated attackers with subscriber privileges or above, to view the order details and order notes, and add order notes. | [] | null | 4.3 | null | null |
|
GHSA-p3wm-3hr8-rqrv | A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.) | [] | null | 9.8 | null | null |
|
RHSA-2018:0502 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: mm/pagewalk.c: walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.8 | null |
CVE-2014-2252 | Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253. | [
"cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7_cpu-1211c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7_cpu_1212c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7_cpu_1214c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7_cpu_1215c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7_cpu_1217c:-:*:*:*:*:*:*:*"
] | null | null | null | 6.1 |
|
GHSA-w4wg-4jcp-7wx8 | EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-m487-w7jq-5grr | In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4
[ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'
[...]
[ 83.964264] Call Trace:
[ 83.964267] <TASK>
[ 83.964269] dump_stack_lvl+0x3f/0xc0
[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110
[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0
[ 83.964281] __ieee80211_start_scan+0x601/0x990
[ 83.964291] nl80211_trigger_scan+0x874/0x980
[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160
[ 83.964298] genl_rcv_msg+0x240/0x270
[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810 | [] | null | 7.8 | null | null |
|
GHSA-hhrg-ww69-4cxj | An issue in CatoNetworks CatoClient before v.5.8.0 allows attackers to escalate privileges and achieve a race condition (TOCTOU) via the PrivilegedHelperTool component. | [] | 5.7 | 8.1 | null | null |
|
CVE-2025-3797 | SeaCMS admin_topic.php sql injection | A vulnerability classified as critical was found in SeaCMS up to 13.3. This vulnerability affects unknown code of the file /admin_topic.php?action=delall. The manipulation of the argument e_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.1 | 4.7 | 4.7 | 5.8 |
CVE-2019-2596 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2023-6257 | Inline Related Posts < 3.6.0 - Subscriber+ Password Protected Post Read | The Inline Related Posts WordPress plugin before 3.6.0 is missing authorization in an AJAX action to ensure that users are allowed to see the content of the posts displayed, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts | [] | null | 4.3 | null | null |
CVE-2018-14852 | Out-of-bounds array access in dhd_rx_frame in drivers/net/wireless/bcmdhd4358/dhd_linux.c in the bcmdhd4358 Wi-Fi driver on the Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 allows an attacker (who has obtained code execution on the Wi-Fi chip) to cause invalid accesses to operating system memory due to improper validation of the network interface index provided by the Wi-Fi chip's firmware. | [
"cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu5eqh7:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*"
] | null | null | 6.3 | 5.8 |
|
GHSA-2q4f-gjpq-vfmh | Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. | [] | null | 4.6 | null | null |
|
CVE-2008-5243 | The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error. | [
"cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2024:1859 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.1 security and bug fix update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests opentelemetry: DoS vulnerability in otelhttp golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. ssh: Prefix truncation attack on Binary Packet Protocol (BPP) golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift_api_data_protection:1.3::el9"
] | null | 4.3 | null | null |
GHSA-hhpx-96r3-vcrp | When browsing a document hosted on an IP address, an attacker could insert certain characters to flip domain and path information in the address bar. This vulnerability affects Firefox < 77. | [] | null | null | null | null |
|
GHSA-j2w7-jvqq-8rgp | A buffer overflow vulnerability exists in the AMF of open5gs 2.1.4. When the length of MSIN in Supi exceeds 24 characters, it leads to AMF denial of service. | [] | null | 7.5 | null | null |
|
CVE-2022-29628 | A cross-site scripting (XSS) vulnerability in /omps/seller of Online Market Place Site v1.0 allows attackers to execute arbitrary web cripts or HTML via a crafted payload injected into the Page parameter. | [
"cpe:2.3:a:online_market_place_site_project:online_market_place_site:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-p594-jv9h-cv8f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tidekey allows Reflected XSS. This issue affects Tidekey: from n/a through 1.1. | [] | null | 7.1 | null | null |
|
CVE-2024-51513 | Vulnerability of processes not being fully terminated in the VPN module
Impact: Successful exploitation of this vulnerability will affect power consumption. | [
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-mj64-2668-m2rv | A data race could occur in the <code>PK11_ChangePW</code> function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2. | [] | null | 7.5 | null | null |
|
CVE-2020-15079 | Improper access control in PrestaShop | In PrestaShop from version 1.5.0.0 and before version 1.7.6.6, there is improper access control in Carrier page, Module Manager and Module Positions. The problem is fixed in version 1.7.6.6 | [
"cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
GHSA-6qj8-c27w-rp33 | Cross-site scripting in Apache Syncome EndUser | It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string. | [] | null | 5.4 | null | null |
GHSA-jpwr-46pv-w7r7 | An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption. | [] | null | null | 7.5 | null |
|
GHSA-g6wj-cmhj-qw7h | Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <= 1.0.7 versions. | [] | null | 8.8 | null | null |
|
CVE-2022-41994 | Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2002-2055 | Cross-site scripting (XSS) vulnerability in userlog.php in TeeKai Tracking Online 1.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter. | [
"cpe:2.3:a:teekai:teekai_tracking_online:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-1077 | NVIDIA GPU Display Driver for Windows and Linux, R450 and R460 driver branch, contains a vulnerability where the software uses a reference count to manage a resource that is incorrectly updated, which may lead to denial of service. | [
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*"
] | null | 6.6 | null | null |
|
CVE-2011-0700 | Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-c3q8-35qx-5r8j | Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote attackers to cause a denial of service via unspecified vectors. | [] | null | null | null | null |
|
GHSA-v8hf-qmfq-rrhf | Cross-site request forgery (CSRF) vulnerability in McAfee Network Data Loss Prevention (NDLP) before 9.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] | null | null | null | null |
|
GHSA-7xmr-c34w-p9w7 | Teedy <= 1.12 is vulnerable to Cross Site Request Forgery (CSRF), due to the lack of CSRF protection. | [] | null | 8.8 | null | null |
|
RHSA-2020:1604 | Red Hat Security Advisory: tcpdump security update | tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.3 | null |
GHSA-v586-fpfj-j7xh | An issue was discovered in com_fields in Joomla! Core before 3.8.8. Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. | [] | null | null | 6.5 | null |
|
CVE-2022-40067 | Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: formSetVirtualSer. | [
"cpe:2.3:o:tenda:ac21_firmware:16.03.08.15:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac21:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-925c-69p2-m4hj | IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947. | [] | null | null | 7.8 | null |
|
GHSA-h2f3-v6c8-jmmw | A vulnerability in the web-based UI of Cisco HyperFlex HX Data Platform Software could allow an unauthenticated, remote attacker to access sensitive information on an affected system. The vulnerability is due to a lack of proper input and authorization of HTTP requests. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based UI of an affected system. A successful exploit could allow the attacker to access files that may contain sensitive data. | [] | null | 5.3 | null | null |
|
CVE-2018-20127 | An issue was discovered in zzzphp cms 1.5.8. del_file in /admin/save.php allows remote attackers to delete arbitrary files via a mixed-case extension and an extra '.' character, because (for example) "php" is blocked but path=F:/1.phP. succeeds. | [
"cpe:2.3:a:zzzcms:zzzphp:1.5.8:*:*:*:*:*:*:*"
] | null | 7.5 | null | 6.4 |
|
GHSA-mmx4-xmqx-wpcf | Vulnerability in the Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: Leisure). The supported version that is affected is 8.10.x. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Hospitality Suite8 executes to compromise Hospitality Suite8. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hospitality Suite8 accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [] | null | null | 5.5 | null |
|
CVE-2024-24791 | Denial of service due to improper 100-continue handling in net/http | The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | [
"cpe:2.3:a:go_standard_library:net\\/http:1.21.12:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHEA-2025:2423 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
CVE-2004-0512 | Multiple unknown vulnerabilities in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to cause a denial of service by triggering a core dump. | [
"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2020-4448 | IBM WebSphere Application Server Network Deployment 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 181228. | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_virtual_enterprise:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_virtual_enterprise:8.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
CVE-2014-0100 | Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-p8hg-mm67-hmp8 | Mattermost fails to properly validate a RegExp built off the server URL path, allowing an attacker in control of an enrolled server to mount a Denial Of Service. | [] | null | 3.1 | null | null |
|
GHSA-m7jf-8pgq-2mqc | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Henryholtgeerts PDF Block plugin <= 1.1.0 versions. | [] | null | 6.5 | null | null |
|
GHSA-9rq4-g25h-r3w7 | Unrestricted file upload vulnerability in admin/editor/filemanager/browser.html in Anantasoft Gazelle CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in user/File/. | [] | null | null | null | null |
|
GHSA-3j9m-hcv9-rpj8 | XSS vulnerability allowing arbitrary JavaScript execution | Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.CVE-2021-41174 XSS vulnerability on unauthenticated pagesSummaryCVSS Score: 6.9 Medium
CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L)We received a security report to [email protected] on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability.It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability.ImpactIf an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser.The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar.There are two ways an unauthenticated user can open a page in Grafana that contains the login button:Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack.The link is to an unauthenticated page. The following pages are vulnerable:`/dashboard-solo/snapshot/*``/dashboard/snapshot/*``/invite/:code`The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }}An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this:https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL.Attack auditWe can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment.Through reverse proxy/load balancer logsTo determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks.Through the Grafana Enterprise audit featureIf you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code.Patched versionsRelease 8.2.3:[Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3)[Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/)Solutions and mitigationsDownload and install the appropriate patch for your version of Grafana.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.WorkaroundIf for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path.Example of an Nginx rule to block the literal string `{{`:Timeline and postmortemHere is a detailed timeline starting from when we originally learned of the issue. All times in UTC.2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability.2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2.2021-10-22 02:02 MEDIUM severity declared.2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ .2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure.2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests.2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud.2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected.2021-10-22 14:05 Grafana Cloud instances updated with a fix.2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified.2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation.2021-10-27 12:00: Grafana Enterprise images released to customers under embargo.2021-11-03 12:00: Public release.Reporting security issuesIf you think you have found a security vulnerability, please send a report to [[email protected]](mailto:[email protected]). This address can be used for all of
Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CAThe key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index).Security announcementsThere is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml). | [] | null | 6.9 | null | null |
CVE-2008-6421 | PHP remote file inclusion vulnerability in social_game_play.php in Social Site Generator (SSG) 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. | [
"cpe:2.3:a:socialsitegenerator:social_site_generator:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2024:0020 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.6 | null | null |
GHSA-4gfv-46xr-qrjq | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jewel Theme Master Addons for Elementor allows Stored XSS.This issue affects Master Addons for Elementor: from n/a through 2.0.6.0. | [] | null | 6.5 | null | null |
|
CVE-2024-37672 | Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the idactivity parameter. | [
"cpe:2.3:a:tessi:docubase:5.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-hp46-5f8h-j7p8 | In FusionPBX up to v4.5.7, the file app\contacts\contact_import.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. | [] | null | 6.1 | null | null |
|
GHSA-c9wx-625j-c7mq | Microsoft Windows XP and Windows 2000, when configured to send administrative alerts and the "Do not overwrite events (clear log manually)" option is set, does not notify the administrator when the log reaches its maximum size, which allows local users and remote attackers to avoid detection. | [] | null | null | null | null |
|
CVE-2024-1530 | ECshop view_sendlist.php sql injection | A vulnerability, which was classified as critical, has been found in ECshop 4.1.8. Affected by this issue is some unknown functionality of the file /admin/view_sendlist.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250562 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:shopex:ecshop:4.1.8:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2009-0878 | The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height. | [
"cpe:2.3:a:wesnoth:wesnoth:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.6.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.0rcl:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:wesnoth:1.4.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jpvc-w686-44qr | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. | [] | null | null | 9.6 | null |
|
RHBA-2024:3840 | Red Hat Bug Fix Advisory: golang bug fix update | golang: net: malformed DNS message can cause infinite loop | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-4662-9qvh-xxm7 | A unintended proxy or intermediary ('confused deputy') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to access protected hosts via crafted HTTP requests. | [] | null | 6.3 | null | null |
|
GHSA-jpj8-cwj3-qpvw | Cross-site scripting (XSS) vulnerability in the login form (login.jsp) of the admin console in Openfire (formerly Wildfire) 2.2.2, and possibly other versions before 2.3.0 Beta 2, allows remote attackers to inject arbitrary web script or HTML via the username parameter, a different vulnerability than CVE-2005-4877. | [] | null | null | null | null |
|
CVE-2015-5646 | Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 allows remote authenticated users to execute arbitrary PHP code via unspecified vectors, aka CyVDB-863 and CyVDB-867. | [
"cpe:2.3:a:cybozu:garoon:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
CVE-2024-41369 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php | [
"cpe:2.3:a:sourcefabric:rpi-jukebox-rfid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-45816 | Storage bucket Directory Traversal in @backstage/plugin-techdocs-backend | Backstage is an open framework for building developer portals. When using the AWS S3 or GCS storage provider for TechDocs it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. All users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:linuxfoundation:backstage:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2007-0841 | Multiple unspecified vulnerabilities in vbDrupal before 4.7.6.0 have unknown impact and remote attack vectors. NOTE: the vector related to Drupal is covered by CVE-2007-0626. These vulnerabilities might be associated with other CVE identifiers. | [
"cpe:2.3:a:vbdrupal:vbdrupal:4.7.5.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2014-7850 | Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation. | [
"cpe:2.3:a:freeipa:freeipa:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-33376 | Connected IO v2.1.0 and prior has an argument injection vulnerability in its iptables command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices. | [
"cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-q4g5-6262-6h9p | The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting plugin for WordPress is vulnerable to union-based SQL Injection via the 'email' parameter in all versions up to, and including, 1.12.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 8.8 | null | null |
|
CVE-2009-2597 | The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request. | [
"cpe:2.3:a:sun:java_system_access_manager_policy_agent:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2016-5304 | Open redirect vulnerability in a report-routing component in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 |
|
RHSA-2014:0877 | Red Hat Security Advisory: ror40-rubygem-activerecord security update | rubygem-activerecord: SQL injection vulnerability in 'range' quoting | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
GHSA-7348-84cp-xjx4 | Unrestricted file upload vulnerability in AspDotNetStorefront 3.3 allows remote authenticated administrators to upload arbitrary files with executable extensions via admin/images.aspx. | [] | null | null | null | null |
|
CVE-2021-25985 | FactorJS - Insufficient Session Expiration Leads to a Local Account Takeover | In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover. | [
"cpe:2.3:a:darwin:factor:*:*:*:*:*:node.js:*:*"
] | null | 7.8 | null | null |
GHSA-8x5q-gq29-2h75 | Improper key usage control in AMD Secure Processor
(ASP) may allow an attacker with local access who has gained arbitrary code
execution privilege in ASP to
extract ASP cryptographic keys, potentially resulting in loss of
confidentiality and integrity. | [] | null | 5.7 | null | null |
|
CVE-2003-0973 | Unknown vulnerability in mod_python 3.0.x before 3.0.4, and 2.7.x before 2.7.9, allows remote attackers to cause a denial of service (httpd crash) via a certain query string. | [
"cpe:2.3:a:apache:mod_python:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mod_python:3.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-2vqg-gr4m-v458 | A stored Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious Jira API responses | [] | null | 4.8 | null | null |
|
GHSA-mfvw-h9jx-hrj7 | Cisco VPN 3000 Concentrator 2.2.x, 3.6(Rel), and 3.x before 3.5.5, allows remote attackers to cause a denial of service via (1) malformed or (2) large ISAKMP packets. | [] | null | null | null | null |
|
GHSA-pm7m-xq2w-2q3x | Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value. | [] | null | null | null | null |
|
CVE-2023-47503 | An issue in jflyfox jfinalCMS v.5.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the login.jsp component in the template management module. | [
"cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-97gg-j6v9-fvp7 | Redirection from an HTTP connection to a "data:" URL assigns the referring site's origin to the "data:" URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. Note: This issue only affects Firefox 49 and 50. This vulnerability affects Firefox < 50.0.1. | [] | null | null | 8.8 | null |
|
CVE-2017-9189 | libautotrace.a in AutoTrace 0.31.1 allows remote attackers to cause a denial of service (invalid read and application crash), related to the GET_COLOR function in color.c:16:11. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-0014 | ScreenOS: Etherleak vulnerability found on ScreenOS device | Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25. | [
"cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r20:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
GHSA-rrp4-84hf-vc2p | An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.2. A specially crafted XCF image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. | [] | null | null | 8.8 | null |
|
RHSA-2021:4602 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.5 | null | null |
CVE-2021-32701 | Possible bypass of token claim validation when OAuth2 Introspection caching is enabled | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. | [
"cpe:2.3:a:ory:oathkeeper:0.38.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ory:oathkeeper:0.38.11:beta1:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2024-54009 | Remote authentication bypass vulnerability in HPE Alletra Storage MP B10000 in versions prior to version 10.4.5 could be remotely exploited to allow disclosure of information. | [] | null | 4 | null | null |
|
CVE-2016-6699 | A remote code execution vulnerability in libstagefright in Mediaserver in Android 7.0 before 2016-11-01 could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Android ID: A-31373622. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-mpfg-wwvh-756m | Multiple buffer overflows in IBM Informix Dynamic Server (IDS) before 9.40.TC6 and 10.00 before 10.00.TC3 allow remote authenticated users to execute arbitrary code via (1) the getname function, as used by (a) _sq_remview, (b) _sq_remproc, (c) _sq_remperms, (d) _sq_distfetch, and (e) _sq_dcatalog; and the (2) SET DEBUG FILE, (3) IFX_FILE_TO_FILE, (4) FILETOCLOB, (5) LOTOFILE, and (6) DBINFO functions (product defect IDs 171649, 171367, 171387, 171391, 171906, 172179). | [] | null | null | null | null |
|
RHSA-2020:1864 | Red Hat Security Advisory: gcc security and bug fix update | gcc: POWER9 "DARN" RNG intrinsic produces repeated output | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.5 | null |
RHSA-2024:5289 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2005-2788 | Multiple SQL injection vulnerabilities in Land Down Under (LDU) 801 and earlier allow remote attackers to execute arbitrary SQL commands via the c parameter to (1) events.php, (2) index.php, or (3) list.php. | [
"cpe:2.3:a:neocrome:land_down_under:700.01:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.02:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.03:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.04:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:700.05:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:701:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:800:*:*:*:*:*:*:*",
"cpe:2.3:a:neocrome:land_down_under:801:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-21400 | SQL injection vulnerability in gaozhifeng PHPMyWind v.5.6 allows a remote attacker to execute arbitrary code via the id variable in the modify function. | [
"cpe:2.3:a:phpmywind:phpmywind:5.6:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2007-5500 | The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2022-33068 | An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors. | [
"cpe:2.3:a:harfbuzz_project:harfbuzz:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-rv54-hf76-46cc | Potential null pointer dereference in KGSL GPU auxiliary command due to improper validation of user input in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.