id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-hfc5-wrcg-96p9
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
5.5
null
null
GHSA-v4mc-gfxw-3c49
Cross Site Request Forgery (CSRF) vulnerability in FlatPress 1.1 via the DeleteFile function in flat/admin.php.
[]
null
null
null
null
cisco-sa-dmi-acl-bypass-Xv8FO8Vz
Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056"].
[]
null
5.8
null
null
CVE-2024-27147
Local Privilege Escalation and Remote Code Execution using snmpd
The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL.
[ "cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*" ]
null
7.4
null
null
CVE-2021-21937
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.
[ "cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*" ]
null
null
7.7
null
CVE-2025-23219
WeGIA has a SQL Injection endpoint 'adicionar_cor.php' parameter 'cor'
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_cor.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.
[]
10
null
null
null
GHSA-5g36-42q4-g626
A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability.
[]
null
4.3
null
null
GHSA-7xcv-jm4f-m6xc
Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages.
[]
null
null
7.5
null
CVE-2013-0009
Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0010.
[ "cpe:2.3:a:microsoft:system_center_operations_manager:2007:r2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_operations_manager:2007:sp1:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-rmwf-2v8p-mwrc
Unisys Data Exchange Management Studio through 5.0.34 doesn't sanitize the input to a HTML document field. This could be used for an XSS attack.
[]
null
5.4
null
null
CVE-2020-12314
Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
[ "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
CVE-2023-2713
IDOR vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform.
Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.
[ "cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2020-15256
Prototype pollution in object-path
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
[ "cpe:2.3:a:object-path_project:object-path:*:*:*:*:*:node.js:*:*" ]
null
7.7
null
null
RHSA-2024:6020
Red Hat Security Advisory: postgresql:15 security update
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
CVE-2022-3067
An issue has been discovered in the Import functionality of GitLab CE/EE affecting all versions starting from 14.4 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an authenticated user to read arbitrary projects' content given the project's ID.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
6.5
null
null
GHSA-67vv-x8fj-h97j
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the lid parameter at admin/index.php?mode=settings&page=lang&action=edit.
[]
null
9.8
null
null
CVE-2014-2104
Multiple cross-site scripting (XSS) vulnerabilities in the Business Voice Services Manager (BVSM) page in Cisco Unified Communications Domain Manager 9.0(.1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCum78536, CSCum78526, CSCum69809, and CSCum63113.
[ "cpe:2.3:a:cisco:unified_communications_domain_manager:9.0\\(.1\\):*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-39929
Uncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:libva:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
RHSA-2009:1106
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server kernel: xen: local denial of service kernel: random: add robust get_random_u32, remove weak get_random_int
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-wvjj-6mc9-hcpm
The estatik plugin before 2.3.0 for WordPress has unauthenticated arbitrary file upload via es_media_images[] to wp-admin/admin-ajax.php.
[]
null
null
null
null
CVE-2021-40324
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
[ "cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2006-0502
PHP remote file inclusion vulnerability in loginout.php in FarsiNews 2.1 Beta 2 and earlier, with register_globals enabled, allows remote attackers to include arbitrary files via a URL in the cutepath parameter.
[ "cpe:2.3:a:farsinews:farsinews:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-41820
Cluster-level privilege escalation in kubean
Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
null
6
null
null
CVE-2008-5591
Cross-site scripting (XSS) vulnerability in login.asp in Nightfall Personal Diary 1.0 allows remote attackers to inject arbitrary web script or HTML via the username parameter and possibly other "login fields." NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:iwrite:nightfall_personal_diary:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-58077
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on common soc_pcm_ret(). It is used from many functions, ignoring -EINVAL is over-kill. The reason why -EINVAL was ignored was it really should only be used upon invalid parameters coming from userspace and in that case we don't want to log an error since we do not want to give userspace a way to do a denial-of-service attack on the syslog / diskspace. So don't use soc_pcm_ret() on .prepare callback is better idea.
[]
null
null
null
null
CVE-2025-3106
LA-Studio Element Kit for Elementor <= 1.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Table of Contents Widget
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Table of Contents widget in all versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2011-3499
Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an EIDP packet with a large size field, which writes a zero byte to an arbitrary memory location.
[ "cpe:2.3:a:progea:movicon_powerhmi:*:*:*:*:*:*:*:*", "cpe:2.3:a:progea:movicon_powerhmi:11:*:*:*:*:*:*:*", "cpe:2.3:a:progea:movicon_powerhmi:11.0.1017:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-jxwx-85vp-gvwm
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
[]
null
7.5
null
null
GHSA-6gf2-pvqw-37ph
Log entry injection in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.
[]
null
4.3
null
null
GHSA-fw8j-hgr2-4336
Unspecified vulnerability in the Oracle Streams component in Oracle Database 10.1.0.5 allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_STREAMS_AUTH.
[]
null
null
null
null
GHSA-g8pw-wqg3-q7fw
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function.
[]
null
9.8
null
null
CVE-2023-42478
Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence Platform
SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to upload agnostic documents in the system which when opened by any other user could lead to high impact on integrity of the application.
[ "cpe:2.3:a:sap:business_objects_business_intelligence_platform:420:*:*:*:*:*:*:*", "cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2016-6264
Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function.
[ "cpe:2.3:a:uclibc:uclibc:-:*:*:*:*:*:*:*", "cpe:2.3:a:uclibc-ng_project:uclibc-ng:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-11243
code-projects Online Shop Store signup.php cross site scripting
A vulnerability classified as problematic has been found in code-projects Online Shop Store 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument m2 with the input <svg%20onload=alert(document.cookie)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:code-projects:online_shop_stores:*:*:*:*:*:*:*:*", "cpe:2.3:a:code-projects:online_shop_store:1.0:*:*:*:*:*:*:*" ]
6.9
4.3
4.3
5
GHSA-7m82-jf96-9qf4
Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating systems, allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP video file.
[]
null
null
null
null
GHSA-jfh3-2j6g-58qv
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14. An app may be able to read sensitive location information.
[]
null
5.5
null
null
GHSA-8jf2-78m7-7f8v
Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps.
[]
null
4.2
null
null
CVE-2021-46586
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15380.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-xg6m-4668-h9qh
Protection mechanism failure in all processes in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows local users to stop certain McAfee ENS processes, reducing the protection offered.
[]
null
null
null
null
GHSA-4jhp-rg38-c7h7
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing crafted a XML file, performs incorrect memory handling, leading to a heap-based buffer over-read in the "normalize line endings" feature.
[]
null
6.5
null
null
GHSA-m47j-h8wj-cg29
The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
9.8
null
null
GHSA-gmg7-7gc2-gpjp
PHP remote file inclusion vulnerability in i-accueil.php in TLM CMS 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter.
[]
null
null
null
null
GHSA-f82h-rc53-967h
Dell PowerScale OneFS Versions 8.2.2.x through 9.9.0.x contain an incorrect specified argument vulnerability. A remote low privileged legitimate user could potentially exploit this vulnerability, leading to information disclosure.
[]
null
4.3
null
null
RHSA-2017:1685
Red Hat Security Advisory: ansible security, bug fix, and enhancement update
Ansible: in some circumstances the mysql_user module may fail to correctly change a password Ansible: Compromised remote hosts can lead to running commands on the Ansible controller ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587)
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
8
null
GHSA-h9hq-cmw2-pxgh
Improper access control vulnerability in Hot Pepper Gourmet App for Android ver.4.111.0 and earlier, and for iOS ver.4.111.0 and earlier allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
[]
null
4.3
null
null
GHSA-7xwh-c8q3-g9mp
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
GHSA-h8jm-j24w-759m
Directory traversal vulnerability in the FTP server (port 22003/tcp) in Farmers WIFE 4.4 SP1 allows remote attackers to create arbitrary files via ".." (dot dot) sequences in a (1) PUT, (2) SIZE, and possibly other commands.
[]
null
null
null
null
GHSA-rhfj-hgfj-99j8
A vulnerability classified as critical has been found in MD-MAFUJUL-HASAN Online-Payroll-Management-System up to 20230911. Affected is an unknown function of the file /shift_viewmore.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-272448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
GHSA-qf8r-xr22-fxr5
IBM Business Process Manager 8.0, 8.5, and 8.6 and IBM Business Automation Workflow 18.0 and 19.0 could allow a remote attacker to bypass security restrictions, caused by the failure to perform insufficient authorization checks. IBM X-Force ID: 181126.
[]
null
null
null
null
CVE-2024-49854
block, bfq: fix uaf for accessing waker_bfqq after splitting
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for accessing waker_bfqq after splitting After commit 42c306ed7233 ("block, bfq: don't break merge chain in bfq_split_bfqq()"), if the current procress is the last holder of bfqq, the bfqq can be freed after bfq_split_bfqq(). Hence recored the bfqq and then access bfqq->waker_bfqq may trigger UAF. What's more, the waker_bfqq may in the merge chain of bfqq, hence just recored waker_bfqq is still not safe. Fix the problem by adding a helper bfq_waker_bfqq() to check if bfqq->waker_bfqq is in the merge chain, and current procress is the only holder.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-9959-vfr9-jv96
NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks.
[]
null
null
null
null
CVE-2011-3349
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
[ "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2024-0559
Enhanced Text Widget < 1.6.6 - Admin+ Stored XSS
The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2022-38667
HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it has begun processing a later request before it has finished processing an earlier request.
[ "cpe:2.3:a:crowcpp:crow:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-68qp-hp65-rmrq
Microsoft SharePoint Server Information Disclosure Vulnerability
[]
null
6.5
null
null
GHSA-6c23-8rhp-2qv3
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2021-3347
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-qjp8-cxc7-rc48
An issue was discovered in Hoosk CMS v1.8.0. There is a XSS vulnerability in install/index.php
[]
null
null
null
null
GHSA-3j67-gcxj-hc23
UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.
[]
null
null
null
null
GHSA-3jh6-397c-67wx
NetApp SnapCenter Server prior to 4.1 does not set the secure flag for a sensitive cookie in an HTTPS session which can allow the transmission of the cookie in plain text over an unencrypted channel.
[]
null
null
5.3
null
CVE-2005-3826
Multiple SQL injection vulnerabilities in Ezyhelpdesk 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) edit_id, (2) faq_id, and (3) c_id parameters in a query string, and (4) the search engine, possibly involving the search_string parameter.
[ "cpe:2.3:a:ezy_helpdesk:ezyhelpdesk:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-6918
In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, the length field of the ipsec option header does not count the size of the option header itself, causing an infinite loop when the length is zero. This issue can allow a remote attacker who is able to send an arbitrary packet to cause the machine to crash.
[ "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
GHSA-f2hc-5rqr-r3c2
Improper handling in the Autodesk FBX-SDK before 2017.1 of type mismatches and previously deleted objects related to reading and converting malformed FBX format files can allow attackers to gain access to uninitialized pointers.
[]
null
null
9.8
null
CVE-2022-1262
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
[ "cpe:2.3:o:dlink:dir-1360_firmware:1.02b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1360_firmware:1.03b02:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1360:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1760_firmware:1.01b04:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1760_firmware:1.11b03:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1960_firmware:1.02b01:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1960_firmware:1.03b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1960:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.04b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2660:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.00b12:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-867_firmware:1.20b10:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-867:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-878_firmware:1.20b05:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-882_firmware:1.20b06:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1360_firmware:1.00b15:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1360_firmware:1.01b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1360:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1960:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2640_firmware:1.01b04:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2640:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.00b14:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.01b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.02b01:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.03b04:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3040_firmware:1.11b02:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3040_firmware:1.12b01:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-3040:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.01b07:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.02b03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.11b02:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-3060:a1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-867_firmware:1.10b04:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-867_firmware:1.30b07:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-867:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-882_firmware:1.30b10:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-882:a1:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2007-1150
Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/.
[ "cpe:2.3:a:lovecms:lovecms:1.4:*:*:*:*:*:*:*" ]
null
null
null
3.6
GHSA-hqc8-7rj6-h7v9
A vulnerability was found in SourceCodester Online Tutor Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /tutor/courses/manage_course.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-hrp7-jrg8-xfwx
An issue in Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 allows attackers to bypass authentication and access the administrative interface via unspecified vectors.
[]
null
8.8
null
null
CVE-2023-35158
XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in restore template
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:9.4:-:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:9.4:rc-1:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:15.0:-:*:*:*:*:*:*" ]
null
9.7
null
null
GHSA-ghjj-5h83-xf6v
Suite CRM version 7.14.2 allows making arbitrary HTTP requests throughthe vulnerable server. This is possible because the application is vulnerableto SSRF.
[]
null
5
null
null
GHSA-jm8p-mrcp-jgcx
The copy function in application/admin/controller/Article.php in NoneCms 1.3.0 allows remote attackers to access the content of internal and external network resources via Server Side Request Forgery (SSRF), because URL validation only considers whether the URL contains the "csdn" substring.
[]
null
null
7.5
null
GHSA-cw8x-jrx2-378j
Multiple SQL injection vulnerabilities in PhpWebGallery 1.5.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) since, (2) sort_by, and (3) items_number parameters to comments.php, (4) the search parameter to category.php, and (5) image_id parameter to picture.php. NOTE: it was later reported that the comments.php/sort_by vector also affects 1.7.2 and earlier.
[]
null
null
null
null
GHSA-9fvv-9rh5-5m6j
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the limitSpeed parameter at /goform/SetClientState.
[]
null
7.5
null
null
RHSA-2015:0866
Red Hat Security Advisory: Red Hat Satellite Server 5 - 40 day End Of Life Notice
This is the 40 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.2 * Red Hat Satellite 5.3 * Red Hat Satellite 5.4 * Red Hat Satellite 5.5
[ "cpe:/a:redhat:network_satellite:5.2::el5", "cpe:/a:redhat:network_satellite:5.3::el5", "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
GHSA-24fj-mqgp-74gr
A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. There is a typo in the affected file name.
[]
5.1
3.5
null
null
CVE-2011-0652
lnsfw1.sys 6.0.2900.5512 in Look 'n' Stop Firewall 2.06p4 and 2.07 allows local users to cause a denial of service (crash) via a crafted 0x80000064 IOCTL request that triggers an assertion failure. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:looknstop:look_\\'n\\'_stop_firewall:2.06:p4:*:*:*:*:*:*", "cpe:2.3:a:looknstop:look_\\'n\\'_stop_firewall:2.07:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2023-52472
crypto: rsa - add a check for allocation failure
In the Linux kernel, the following vulnerability has been resolved: crypto: rsa - add a check for allocation failure Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-446m-mv8f-q348
Regular Expression Denial of Service in moment
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings.RecommendationUpdate to version 2.19.3 or later.
[]
null
7.5
null
null
CVE-2005-3913
Unspecified vulnerability in the domain alias management in Virtual Hosting Control System (VHCS) 2.4.6.2, related to "creating and deleting forwards for domain aliases," allows users to hijack the forwardings of other users.
[ "cpe:2.3:a:vchs:vchs:2.4.6.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-9hp2-vhc2-jq3p
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
[]
null
null
9
null
CVE-2023-51698
Atril's CBT comic book parsing vulnerable to Remote Code Execution
Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
[ "cpe:2.3:a:mate-desktop:atril:*:*:*:*:*:*:*:*" ]
null
9.6
null
null
GHSA-pgjj-866w-fc5c
Risk of code injection
ImpactSome routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issuesPatchesTemporarily removed the problematic route and added a `no-new-func` rule to eslint Self-built users should upgrade to 7f1c430 and later as soon as possibleCreditsTencent Woodpecker Security TeamFor more informationIf you have any questions or comments about this advisory:Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)Email us at [[email protected]](mailto:[email protected])
[]
null
8.6
null
null
CVE-2021-34429
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
[ "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter_plug-in:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*", "cpe:2.3:a:oracle:retail_eftlink:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:stream_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:stream_analytics:19c:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-h2ww-3j54-pccx
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
[]
null
null
7.5
null
GHSA-hmgw-9jrg-hf2m
Directus crashes on invalid WebSocket message
SummaryIt seems that any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. This could probably be posted as an issue and I might even be able to put together a pull request for a fix (if only I had some extra time...), but I decided to instead post as a vulnerability just for the maintainers, since this seemingly can be used to crash any live Directus server if websockets are enabled, so public disclosure is not a good idea until the issue is fixed.DetailsThe fix for this seems quite simple; the websocket server just needs to properly catch the error instead of crashing the server. See for example: https://github.com/websockets/ws/issues/2098PoCStart a fresh Directus server (using for example the compose file here: https://docs.directus.io/self-hosted/docker-guide.html). Enable websockets by setting `WEBSOCKETS_ENABLED: 'true'` environment variable.run a separate node app somewhere else to send an invalid frame to the server:ImpactThe server crashes with an error: `RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear`. Server needs to be manually restarted to get back online (if there's no recovery mechanism in place, as there often isn't with simple node servers). This was confirmed on a local server, and additionally I was able to crash our staging server with the same code, just pointing to our staging Directus server running at fly.io. It seems to also crash servers running in the [directus.cloud](https://directus.cloud) service. I created https://websocket-test.directus.app/, pointed the above script to the websocket url of that instance and the server does crash for a while. It seems that in there there's a mechanism for bringing the server back up quite fast, but it would be quite trivial for anyone to DoS any server running in directus.cloud by just spamming these invalid frames to the server.
[]
null
7.5
null
null
CVE-2020-24372
LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c.
[ "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*", "cpe:2.3:a:luajit:luajit:2.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:luajit:luajit:2.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:luajit:luajit:2.1.0:beta3:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-hc48-m7gp-vcrj
A reflected Cross-Site Scripting (XSS) vulnerability was found on Temenos T24 Browser R19.40 that enables a remote attacker to execute arbitrary JavaScript code via the skin parameter in the about.jsp and genrequest.jsp components.
[]
null
5.4
null
null
GHSA-6j3f-6pm7-2pq3
SQL Injection vulnerability in DDSN Net Pty Ltd (DDSN Interactive) DDSN Interactive cm3 Acora CMS 10.1.1 allows an attacker to execute arbitrary code via the table parameter.
[]
null
8.1
null
null
GHSA-q8vq-355x-4874
A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution.
[]
null
null
8.8
null
GHSA-x4wq-676q-52fx
dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action, related to controllers/Weixin.php.
[]
null
null
6.1
null
GHSA-m8h4-qc98-xw3m
consoleConnect.jsp in Cyclades AlterPath Manager (APM) Console Server 1.2.1 allows remote attackers to connect to arbitrary consoles by modifying the consolename parameter.
[]
null
null
null
null
CVE-2023-43710
Os Commerce 4.12.56860 - Cross Site Scripting Reflected (XSS)
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1][MODULE_SHIPPING_PERCENT_TEXT_TITLE]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.
[ "cpe:2.3:a:oscommerce:oscommerce:4.12.56860:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-j2cq-g9qm-4pcv
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests.
[]
null
7.2
null
null
CVE-2007-4319
The management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device allows remote authenticated administrators to cause a denial of service (infinite reboot loop) via invalid configuration data. NOTE: this issue might not cross privilege boundaries, and it might be resultant from CSRF; if so, then it should not be included in CVE.
[ "cpe:2.3:h:zyxel:zynos:3.62:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:zywall_2:*:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-3fq7-xp3x-g73j
Cross-site scripting (XSS) vulnerability in wp-plugins-net/index.php in the WP Plugin Manager (wppm) plugin 1.6.4.b and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filter parameter.
[]
null
null
null
null
GHSA-9wj5-w226-r39m
Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all order confirmations from the online shop via the printmail plugin.
[]
null
7.5
null
null
CVE-2024-49701
WordPress Mags theme <= 1.1.6 - Local File Inclusion vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse Mags.This issue affects Mags: from n/a through 1.1.6.
[ "cpe:2.3:a:themehorse:interface:-:*:*:*:*:wordpress:*:*" ]
null
7.5
null
null
GHSA-f6j3-8mjq-3wxc
Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.
[]
null
null
5.3
null
CVE-2024-51208
File Upload vulnerability in change-image.php in Anuj Kumar's Boat Booking System version 1.0 allows local attackers to upload a malicious PHP script via the Image Upload Mechanism parameter.
[ "cpe:2.3:a:phpgurukul:boat_booking_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:phpgurukul:boat_booking_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2021-26329
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
[ "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
RHSA-2005:575
Red Hat Security Advisory: Adobe Acrobat Reader security update
security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null