id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-hfc5-wrcg-96p9 | Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | 5.5 | null | null |
|
GHSA-v4mc-gfxw-3c49 | Cross Site Request Forgery (CSRF) vulnerability in FlatPress 1.1 via the DeleteFile function in flat/admin.php. | [] | null | null | null | null |
|
cisco-sa-dmi-acl-bypass-Xv8FO8Vz | Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability | A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).
This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056"]. | [] | null | 5.8 | null | null |
CVE-2024-27147 | Local Privilege Escalation and Remote Code Execution using snmpd | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | [
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
CVE-2021-21937 | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | [
"cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*"
] | null | null | 7.7 | null |
|
CVE-2025-23219 | WeGIA has a SQL Injection endpoint 'adicionar_cor.php' parameter 'cor' | WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_cor.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10. | [] | 10 | null | null | null |
GHSA-5g36-42q4-g626 | A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability. | [] | null | 4.3 | null | null |
|
GHSA-7xcv-jm4f-m6xc | Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages. | [] | null | null | 7.5 | null |
|
CVE-2013-0009 | Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0010. | [
"cpe:2.3:a:microsoft:system_center_operations_manager:2007:r2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2007:sp1:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-rmwf-2v8p-mwrc | Unisys Data Exchange Management Studio through 5.0.34 doesn't sanitize the input to a HTML document field. This could be used for an XSS attack. | [] | null | 5.4 | null | null |
|
CVE-2020-12314 | Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [
"cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
CVE-2023-2713 | IDOR vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform. | Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.
| [
"cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2020-15256 | Prototype pollution in object-path | A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. | [
"cpe:2.3:a:object-path_project:object-path:*:*:*:*:*:node.js:*:*"
] | null | 7.7 | null | null |
RHSA-2024:6020 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2022-3067 | An issue has been discovered in the Import functionality of GitLab CE/EE affecting all versions starting from 14.4 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an authenticated user to read arbitrary projects' content given the project's ID. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-67vv-x8fj-h97j | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the lid parameter at admin/index.php?mode=settings&page=lang&action=edit. | [] | null | 9.8 | null | null |
|
CVE-2014-2104 | Multiple cross-site scripting (XSS) vulnerabilities in the Business Voice Services Manager (BVSM) page in Cisco Unified Communications Domain Manager 9.0(.1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCum78536, CSCum78526, CSCum69809, and CSCum63113. | [
"cpe:2.3:a:cisco:unified_communications_domain_manager:9.0\\(.1\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-39929 | Uncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:libva:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
RHSA-2009:1106 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server kernel: xen: local denial of service kernel: random: add robust get_random_u32, remove weak get_random_int | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-wvjj-6mc9-hcpm | The estatik plugin before 2.3.0 for WordPress has unauthenticated arbitrary file upload via es_media_images[] to wp-admin/admin-ajax.php. | [] | null | null | null | null |
|
CVE-2021-40324 | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | [
"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2006-0502 | PHP remote file inclusion vulnerability in loginout.php in FarsiNews 2.1 Beta 2 and earlier, with register_globals enabled, allows remote attackers to include arbitrary files via a URL in the cutepath parameter. | [
"cpe:2.3:a:farsinews:farsinews:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-41820 | Cluster-level privilege escalation in kubean | Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 6 | null | null |
CVE-2008-5591 | Cross-site scripting (XSS) vulnerability in login.asp in Nightfall Personal Diary 1.0 allows remote attackers to inject arbitrary web script or HTML via the username parameter and possibly other "login fields." NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:iwrite:nightfall_personal_diary:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-58077 | ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback | In the Linux kernel, the following vulnerability has been resolved:
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port"
log severity") ignores -EINVAL error message on common soc_pcm_ret().
It is used from many functions, ignoring -EINVAL is over-kill.
The reason why -EINVAL was ignored was it really should only be used
upon invalid parameters coming from userspace and in that case we don't
want to log an error since we do not want to give userspace a way to do
a denial-of-service attack on the syslog / diskspace.
So don't use soc_pcm_ret() on .prepare callback is better idea. | [] | null | null | null | null |
CVE-2025-3106 | LA-Studio Element Kit for Elementor <= 1.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Table of Contents Widget | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Table of Contents widget in all versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
CVE-2011-3499 | Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an EIDP packet with a large size field, which writes a zero byte to an arbitrary memory location. | [
"cpe:2.3:a:progea:movicon_powerhmi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:progea:movicon_powerhmi:11:*:*:*:*:*:*:*",
"cpe:2.3:a:progea:movicon_powerhmi:11.0.1017:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-jxwx-85vp-gvwm | Regular Expression Denial of Service in jquery-validation | The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). | [] | null | 7.5 | null | null |
GHSA-6gf2-pvqw-37ph | Log entry injection in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase. | [] | null | 4.3 | null | null |
GHSA-fw8j-hgr2-4336 | Unspecified vulnerability in the Oracle Streams component in Oracle Database 10.1.0.5 allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_STREAMS_AUTH. | [] | null | null | null | null |
|
GHSA-g8pw-wqg3-q7fw | TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function. | [] | null | 9.8 | null | null |
|
CVE-2023-42478 | Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence Platform | SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to upload agnostic documents in the system which when opened by any other user could lead to high impact on integrity of the application.
| [
"cpe:2.3:a:sap:business_objects_business_intelligence_platform:420:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2016-6264 | Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function. | [
"cpe:2.3:a:uclibc:uclibc:-:*:*:*:*:*:*:*",
"cpe:2.3:a:uclibc-ng_project:uclibc-ng:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-11243 | code-projects Online Shop Store signup.php cross site scripting | A vulnerability classified as problematic has been found in code-projects Online Shop Store 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument m2 with the input <svg%20onload=alert(document.cookie)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:online_shop_stores:*:*:*:*:*:*:*:*",
"cpe:2.3:a:code-projects:online_shop_store:1.0:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 |
GHSA-7m82-jf96-9qf4 | Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating systems, allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP video file. | [] | null | null | null | null |
|
GHSA-jfh3-2j6g-58qv | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14. An app may be able to read sensitive location information. | [] | null | 5.5 | null | null |
|
GHSA-8jf2-78m7-7f8v | Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps. | [] | null | 4.2 | null | null |
|
CVE-2021-46586 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15380. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-xg6m-4668-h9qh | Protection mechanism failure in all processes in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows local users to stop certain McAfee ENS processes, reducing the protection offered. | [] | null | null | null | null |
|
GHSA-4jhp-rg38-c7h7 | An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing crafted a XML file, performs incorrect memory handling, leading to a heap-based buffer over-read in the "normalize line endings" feature. | [] | null | 6.5 | null | null |
|
GHSA-m47j-h8wj-cg29 | The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 9.8 | null | null |
|
GHSA-gmg7-7gc2-gpjp | PHP remote file inclusion vulnerability in i-accueil.php in TLM CMS 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter. | [] | null | null | null | null |
|
GHSA-f82h-rc53-967h | Dell PowerScale OneFS Versions 8.2.2.x through 9.9.0.x contain an incorrect specified argument vulnerability. A remote low privileged legitimate user could potentially exploit this vulnerability, leading to information disclosure. | [] | null | 4.3 | null | null |
|
RHSA-2017:1685 | Red Hat Security Advisory: ansible security, bug fix, and enhancement update | Ansible: in some circumstances the mysql_user module may fail to correctly change a password Ansible: Compromised remote hosts can lead to running commands on the Ansible controller ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 8 | null |
GHSA-h9hq-cmw2-pxgh | Improper access control vulnerability in Hot Pepper Gourmet App for Android ver.4.111.0 and earlier, and for iOS ver.4.111.0 and earlier allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App. | [] | null | 4.3 | null | null |
|
GHSA-7xwh-c8q3-g9mp | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
GHSA-h8jm-j24w-759m | Directory traversal vulnerability in the FTP server (port 22003/tcp) in Farmers WIFE 4.4 SP1 allows remote attackers to create arbitrary files via ".." (dot dot) sequences in a (1) PUT, (2) SIZE, and possibly other commands. | [] | null | null | null | null |
|
GHSA-rhfj-hgfj-99j8 | A vulnerability classified as critical has been found in MD-MAFUJUL-HASAN Online-Payroll-Management-System up to 20230911. Affected is an unknown function of the file /shift_viewmore.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-272448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
GHSA-qf8r-xr22-fxr5 | IBM Business Process Manager 8.0, 8.5, and 8.6 and IBM Business Automation Workflow 18.0 and 19.0 could allow a remote attacker to bypass security restrictions, caused by the failure to perform insufficient authorization checks. IBM X-Force ID: 181126. | [] | null | null | null | null |
|
CVE-2024-49854 | block, bfq: fix uaf for accessing waker_bfqq after splitting | In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix uaf for accessing waker_bfqq after splitting
After commit 42c306ed7233 ("block, bfq: don't break merge chain in
bfq_split_bfqq()"), if the current procress is the last holder of bfqq,
the bfqq can be freed after bfq_split_bfqq(). Hence recored the bfqq and
then access bfqq->waker_bfqq may trigger UAF. What's more, the waker_bfqq
may in the merge chain of bfqq, hence just recored waker_bfqq is still
not safe.
Fix the problem by adding a helper bfq_waker_bfqq() to check if
bfqq->waker_bfqq is in the merge chain, and current procress is the only
holder. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-9959-vfr9-jv96 | NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks. | [] | null | null | null | null |
|
CVE-2011-3349 | lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation. | [
"cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2024-0559 | Enhanced Text Widget < 1.6.6 - Admin+ Stored XSS | The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2022-38667 | HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it has begun processing a later request before it has finished processing an earlier request. | [
"cpe:2.3:a:crowcpp:crow:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-68qp-hp65-rmrq | Microsoft SharePoint Server Information Disclosure Vulnerability | [] | null | 6.5 | null | null |
|
GHSA-6c23-8rhp-2qv3 | This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2021-3347 | An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-qjp8-cxc7-rc48 | An issue was discovered in Hoosk CMS v1.8.0. There is a XSS vulnerability in install/index.php | [] | null | null | null | null |
|
GHSA-3j67-gcxj-hc23 | UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges. | [] | null | null | null | null |
|
GHSA-3jh6-397c-67wx | NetApp SnapCenter Server prior to 4.1 does not set the secure flag for a sensitive cookie in an HTTPS session which can allow the transmission of the cookie in plain text over an unencrypted channel. | [] | null | null | 5.3 | null |
|
CVE-2005-3826 | Multiple SQL injection vulnerabilities in Ezyhelpdesk 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) edit_id, (2) faq_id, and (3) c_id parameters in a query string, and (4) the search engine, possibly involving the search_string parameter. | [
"cpe:2.3:a:ezy_helpdesk:ezyhelpdesk:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-6918 | In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, the length field of the ipsec option header does not count the size of the option header itself, causing an infinite loop when the length is zero. This issue can allow a remote attacker who is able to send an arbitrary packet to cause the machine to crash. | [
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-f2hc-5rqr-r3c2 | Improper handling in the Autodesk FBX-SDK before 2017.1 of type mismatches and previously deleted objects related to reading and converting malformed FBX format files can allow attackers to gain access to uninitialized pointers. | [] | null | null | 9.8 | null |
|
CVE-2022-1262 | A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. | [
"cpe:2.3:o:dlink:dir-1360_firmware:1.02b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1360_firmware:1.03b02:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1360:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1760_firmware:1.01b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1760_firmware:1.11b03:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1960_firmware:1.02b01:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1960_firmware:1.03b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1960:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.04b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2660:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.00b12:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-867_firmware:1.20b10:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-867:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-878_firmware:1.20b05:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-882_firmware:1.20b06:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1360_firmware:1.00b15:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1360_firmware:1.01b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1960:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2640_firmware:1.01b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2640:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.00b14:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.01b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.02b01:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.03b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:beta:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3040_firmware:1.11b02:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3040_firmware:1.12b01:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-3040:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.01b07:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.02b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.11b02:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-3060:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-867_firmware:1.10b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-867_firmware:1.30b07:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-867:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-882_firmware:1.30b10:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-882:a1:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2007-1150 | Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/. | [
"cpe:2.3:a:lovecms:lovecms:1.4:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
GHSA-hqc8-7rj6-h7v9 | A vulnerability was found in SourceCodester Online Tutor Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /tutor/courses/manage_course.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
GHSA-hrp7-jrg8-xfwx | An issue in Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 allows attackers to bypass authentication and access the administrative interface via unspecified vectors. | [] | null | 8.8 | null | null |
|
CVE-2023-35158 | XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in restore template | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:9.4:-:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:9.4:rc-1:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:-:*:*:*:*:*:*"
] | null | 9.7 | null | null |
GHSA-ghjj-5h83-xf6v | Suite CRM version 7.14.2 allows making arbitrary HTTP requests throughthe vulnerable server. This is possible because the application is vulnerableto SSRF. | [] | null | 5 | null | null |
|
GHSA-jm8p-mrcp-jgcx | The copy function in application/admin/controller/Article.php in NoneCms 1.3.0 allows remote attackers to access the content of internal and external network resources via Server Side Request Forgery (SSRF), because URL validation only considers whether the URL contains the "csdn" substring. | [] | null | null | 7.5 | null |
|
GHSA-cw8x-jrx2-378j | Multiple SQL injection vulnerabilities in PhpWebGallery 1.5.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) since, (2) sort_by, and (3) items_number parameters to comments.php, (4) the search parameter to category.php, and (5) image_id parameter to picture.php. NOTE: it was later reported that the comments.php/sort_by vector also affects 1.7.2 and earlier. | [] | null | null | null | null |
|
GHSA-9fvv-9rh5-5m6j | Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the limitSpeed parameter at /goform/SetClientState. | [] | null | 7.5 | null | null |
|
RHSA-2015:0866 | Red Hat Security Advisory: Red Hat Satellite Server 5 - 40 day End Of Life Notice | This is the 40 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.2
* Red Hat Satellite 5.3
* Red Hat Satellite 5.4
* Red Hat Satellite 5.5 | [
"cpe:/a:redhat:network_satellite:5.2::el5",
"cpe:/a:redhat:network_satellite:5.3::el5",
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6"
] | null | null | null | null |
GHSA-24fj-mqgp-74gr | A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. There is a typo in the affected file name. | [] | 5.1 | 3.5 | null | null |
|
CVE-2011-0652 | lnsfw1.sys 6.0.2900.5512 in Look 'n' Stop Firewall 2.06p4 and 2.07 allows local users to cause a denial of service (crash) via a crafted 0x80000064 IOCTL request that triggers an assertion failure. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:looknstop:look_\\'n\\'_stop_firewall:2.06:p4:*:*:*:*:*:*",
"cpe:2.3:a:looknstop:look_\\'n\\'_stop_firewall:2.07:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-52472 | crypto: rsa - add a check for allocation failure | In the Linux kernel, the following vulnerability has been resolved:
crypto: rsa - add a check for allocation failure
Static checkers insist that the mpi_alloc() allocation can fail so add
a check to prevent a NULL dereference. Small allocations like this
can't actually fail in current kernels, but adding a check is very
simple and makes the static checkers happy. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-446m-mv8f-q348 | Regular Expression Denial of Service in moment | Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings.RecommendationUpdate to version 2.19.3 or later. | [] | null | 7.5 | null | null |
CVE-2005-3913 | Unspecified vulnerability in the domain alias management in Virtual Hosting Control System (VHCS) 2.4.6.2, related to "creating and deleting forwards for domain aliases," allows users to hijack the forwardings of other users. | [
"cpe:2.3:a:vchs:vchs:2.4.6.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-9hp2-vhc2-jq3p | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H). | [] | null | null | 9 | null |
|
CVE-2023-51698 | Atril's CBT comic book parsing vulnerable to Remote Code Execution | Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6. | [
"cpe:2.3:a:mate-desktop:atril:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
GHSA-pgjj-866w-fc5c | Risk of code injection | ImpactSome routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issuesPatchesTemporarily removed the problematic route and added a `no-new-func` rule to eslint
Self-built users should upgrade to 7f1c430 and later as soon as possibleCreditsTencent Woodpecker Security TeamFor more informationIf you have any questions or comments about this advisory:Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)Email us at [[email protected]](mailto:[email protected]) | [] | null | 8.6 | null | null |
CVE-2021-34429 | For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5. | [
"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter_plug-in:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*",
"cpe:2.3:a:oracle:retail_eftlink:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:stream_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:stream_analytics:19c:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-h2ww-3j54-pccx | The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine. | [] | null | null | 7.5 | null |
|
GHSA-hmgw-9jrg-hf2m | Directus crashes on invalid WebSocket message | SummaryIt seems that any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. This could probably be posted as an issue and I might even be able to put together a pull request for a fix (if only I had some extra time...), but I decided to instead post as a vulnerability just for the maintainers, since this seemingly can be used to crash any live Directus server if websockets are enabled, so public disclosure is not a good idea until the issue is fixed.DetailsThe fix for this seems quite simple; the websocket server just needs to properly catch the error instead of crashing the server. See for example: https://github.com/websockets/ws/issues/2098PoCStart a fresh Directus server (using for example the compose file here: https://docs.directus.io/self-hosted/docker-guide.html). Enable websockets by setting `WEBSOCKETS_ENABLED: 'true'` environment variable.run a separate node app somewhere else to send an invalid frame to the server:ImpactThe server crashes with an error: `RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear`. Server needs to be manually restarted to get back online (if there's no recovery mechanism in place, as there often isn't with simple node servers). This was confirmed on a local server, and additionally I was able to crash our staging server with the same code, just pointing to our staging Directus server running at fly.io. It seems to also crash servers running in the [directus.cloud](https://directus.cloud) service. I created https://websocket-test.directus.app/, pointed the above script to the websocket url of that instance and the server does crash for a while. It seems that in there there's a mechanism for bringing the server back up quite fast, but it would be quite trivial for anyone to DoS any server running in directus.cloud by just spamming these invalid frames to the server. | [] | null | 7.5 | null | null |
CVE-2020-24372 | LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c. | [
"cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luajit:luajit:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:luajit:luajit:2.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:luajit:luajit:2.1.0:beta3:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-hc48-m7gp-vcrj | A reflected Cross-Site Scripting (XSS) vulnerability was found on Temenos T24 Browser R19.40 that enables a remote attacker to execute arbitrary JavaScript code via the skin parameter in the about.jsp and genrequest.jsp components. | [] | null | 5.4 | null | null |
|
GHSA-6j3f-6pm7-2pq3 | SQL Injection vulnerability in DDSN Net Pty Ltd (DDSN Interactive) DDSN Interactive cm3 Acora CMS 10.1.1 allows an attacker to execute arbitrary code via the table parameter. | [] | null | 8.1 | null | null |
|
GHSA-q8vq-355x-4874 | A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution. | [] | null | null | 8.8 | null |
|
GHSA-x4wq-676q-52fx | dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action, related to controllers/Weixin.php. | [] | null | null | 6.1 | null |
|
GHSA-m8h4-qc98-xw3m | consoleConnect.jsp in Cyclades AlterPath Manager (APM) Console Server 1.2.1 allows remote attackers to connect to arbitrary consoles by modifying the consolename parameter. | [] | null | null | null | null |
|
CVE-2023-43710 | Os Commerce 4.12.56860 - Cross Site Scripting Reflected (XSS) | Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "configuration_title[1][MODULE_SHIPPING_PERCENT_TEXT_TITLE]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. | [
"cpe:2.3:a:oscommerce:oscommerce:4.12.56860:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-j2cq-g9qm-4pcv | Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. | [] | null | 7.2 | null | null |
|
CVE-2007-4319 | The management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device allows remote authenticated administrators to cause a denial of service (infinite reboot loop) via invalid configuration data. NOTE: this issue might not cross privilege boundaries, and it might be resultant from CSRF; if so, then it should not be included in CVE. | [
"cpe:2.3:h:zyxel:zynos:3.62:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_2:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-3fq7-xp3x-g73j | Cross-site scripting (XSS) vulnerability in wp-plugins-net/index.php in the WP Plugin Manager (wppm) plugin 1.6.4.b and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filter parameter. | [] | null | null | null | null |
|
GHSA-9wj5-w226-r39m | Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all order confirmations from the online shop via the printmail plugin. | [] | null | 7.5 | null | null |
|
CVE-2024-49701 | WordPress Mags theme <= 1.1.6 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse Mags.This issue affects Mags: from n/a through 1.1.6. | [
"cpe:2.3:a:themehorse:interface:-:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null |
GHSA-f6j3-8mjq-3wxc | Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV. | [] | null | null | 5.3 | null |
|
CVE-2024-51208 | File Upload vulnerability in change-image.php in Anuj Kumar's Boat Booking System version 1.0 allows local attackers to upload a malicious PHP script via the Image Upload Mechanism parameter. | [
"cpe:2.3:a:phpgurukul:boat_booking_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgurukul:boat_booking_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2021-26329 | AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources. | [
"cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
RHSA-2005:575 | Red Hat Security Advisory: Adobe Acrobat Reader security update | security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.