id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-wg4v-2hfx-3xpx
An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'.
[]
null
null
null
null
CVE-2023-21287
In multiple locations, there is a possible code execution due to type confusion. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:a:google:admob:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-rm8m-2mmh-c8h3
Multiple cross-site scripting (XSS) vulnerabilities in index.php in XZero Community Classifieds 4.97.8 allow remote attackers to inject arbitrary web script or HTML via (1) the postevent parameter in a post action or (2) the _xzcal_y parameter.
[]
null
null
null
null
GHSA-g9wf-5777-gq43
Django-Unicorn Class Pollution Vulnerability, Leading to XSS, DoS and Authentication Bypass
SummaryDjango-Unicorn is vulnerable to python class pollution vulnerability, a new type of vulnerability categorized under [CWE-915](https://cwe.mitre.org/data/definitions/915.html). The vulnerability arises from the core functionality `set_property_value`, which can be remotely triggered by users by crafting appropriate component requests and feeding in values of second and third parameter to the vulnerable function, leading to arbitrary changes to the python runtime status.At least five ways of vulnerability exploitation have been found, stably resulting in Cross-Site Scripting (XSS), Denial of Service (DoS), and Authentication Bypass attacks in almost every Django-Unicorn-based application.Analysis of Vulnerable FunctionBy taking a look at the vulnerable function `set_property_value` located at: `django_unicorn/views/action_parsers/utils.py`. You can observe the functionality is responsible for modifying a property value of an object.The property is specified by a dotted form of path at the second parameter `property_name`, where nested reference to object is supported, and base object and the assigned value is given by the first parameter `component` and third parameter `property_value`.Meanwhile, this functionality can be directly triggered by a component request, one of the core functionalities of the project, by specifying the request type as `syncInput` and payload object would be fed in the dotted-path (2nd) parameter and assigned value (3rd) parameter of the vulnerable function.You are now aware of that users from the remote can fully control the `property_name` and `property_value` of the vulnerable function. By default the preperty value overwrite can only be performed on the component object, which is always the first parameter of the function.However, the functionality failed to count in the situation where bad actors can modify the normal path to traverse to other objects in the python runtime, by leveraging the **magic attributes**. For example, if the `property_name` was set to `__init__.__globals__`, the component context would change to global context of the component module, which means you can modify any attributes of the objects that are located in the global scope of the component module. These objects also include other modules that have been imported in the component module, which comprises of a pollutable dependency chain.With all these techniques introduced, you can now change any global objects including, global variables/instances/classes/functions of any module that is in a chain of dependency from the component module.The next section introduces the five exploitation gadgets found so far, leading to reflected XSS, stored XSS, authentication bypass and DOS attack. It uses a locally deployed `django-unicorn.com` as demo website to showcase its large-scale impact.Here, gadgets refer to the dependency code snippets by default introduced by django-unicorn and changing its status can result in an attack sequence, such as XSS.Proof of Concept#1 Reflected Cross-Site Scripting by Overwriting bs4 HTML sanitizerDjango-Unicorn implants the `EntitySubstitution` rule from beautifulsoup4 library into its [HTML formatter](https://github.com/adamghill/django-unicorn/blob/7dcb01009c3c4653b24e0fb06c7bc0f9d521cbb0/django_unicorn/components/unicorn_template_response.py#L125), formatting all the template response messages.![image-20250121163510422](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-35-11-a1aa5cfa196383e3a26636eb80bd85f0.png)While [this rule](https://github.com/akalongman/python-beautifulsoup/blob/master/bs4/dammit.py#L79) is specified in a global dictionary, you can exploit the class pollution vulnerability to overwrite it.In this demonstration, replaced the sanitizer's `<` item value with the XSS payload. whenever a template reponse renders a "<" in cleartext, it will be converted to the payload, leading to XSS attack.![bs4-xss](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-40-56-5ecbe8f2d39a6cc9a546744ca995b2d9.gif)#2 Stored Cross-Site Scripting by Overwriting Unicorn Setting and [Django](https://github.com/django/django) Json Script SanitizerThere is always a script tag in the webpage. Among it, a `NAME` value is dynamically extracted both from the `MORPHER_NAMES` and `DEFAULT_MORPHER_NAME` variable in the [setting module](https://github.com/adamghill/django-unicorn/blob/7dcb01009c3c4653b24e0fb06c7bc0f9d521cbb0/django_unicorn/settings.py#L12).![image-20250121165007647](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-50-08-f2a628f8d06ba81c9bb71f78766cecb7.png)However, simply polluting these values can not lead to a stored XSS attack. Django by default escape some of the special characters into unicode sequences.![image-20250121164947336](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-49-47-b756d516b0b3e3d025d876963e1dbf6a.png)Going through the source code of django, you will find the actual sanitizer located at `_json_script_escapes` variable at [django/utils/html.py](https://github.com/django/django/blob/862b7f98a02b7973848db578ff6d24ec8500fdb4/django/utils/html.py#L84).![image-20250121165247245](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-52-47-b60cd91f46ed89bc7b0a4b3f68521827.png)By polluting this variable to clear it out, you finally achieve a stored XSS attack.![image-20250121165839892](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-58-40-97608fc15544d68edbfbdc8e61744b12.png)PoC:![json_unicode_xss](https://api.2h0ng.wiki:443/noteimages/2025/01/21/16-58-59-f8da2463bbaa8de4f305c6fd2235172b.gif)#3 Stored Cross-Site Scripting by Overwriting [Django](https://github.com/django/django) Error Page Source CodeDjango by default stores its error page source code in a global variable named `ERROR_PAGE_TEMPLATE` at [django/views/defaults.py](https://github.com/django/django/blob/main/django/views/defaults.py#L16).![image-20250121170357900](https://api.2h0ng.wiki:443/noteimages/2025/01/21/17-03-58-86c9cf2abfa28f0e1ed479521af5be2e.png)By polluting this variable to XSS payload. whenever a user triggers an error in the application, such as access an unexisting resource, the attack payload fires out.![django-404-xss](https://api.2h0ng.wiki:443/noteimages/2025/01/21/17-05-05-e6ce889e7549243a5d8a60877fbb8cff.gif)#4 Authentication Bypass by Overwriting [Django](https://github.com/django/django) Secret KeyDjango secret key is typically used to sign and verify session cookies and other security related mechanism. By polluting its runtime value to attacker intended, attacker can forge session cookies to login in to the system as any user.Even though, django-unicorn.com doesn't have an authentication layer, you can still observe a successful secret key pollution by inspecting the changed checksum in the HTTP response, since the checksum is generated by encrypting the data field in the request body with the secret key.![authentication_bypass](https://api.2h0ng.wiki:443/noteimages/2025/01/21/17-12-20-424da7c5c960471600863828fba93c4a.gif)#5 Denial of Service by Overwriting `timed` Decorator MethodThe [timed](https://github.com/adamghill/django-unicorn/blob/7dcb01009c3c4653b24e0fb06c7bc0f9d521cbb0/django_unicorn/decorators.py#L9) decorator is used to modify many important functions in the django-unicorn, such as [_call_method_name](https://github.com/adamghill/django-unicorn/blob/7dcb01009c3c4653b24e0fb06c7bc0f9d521cbb0/django_unicorn/views/action_parsers/call_method.py#L122).![image-20250121171823756](https://api.2h0ng.wiki:443/noteimages/2025/01/21/17-18-24-0e1cec22199ab2dc1bc9bbcb76d2dcd9.png)By polluting the core decorator method `timed` to a string, you make a function call always call a uncallable string, leading to the backend crashed, thus denial of service attack.![dos_attack](https://api.2h0ng.wiki:443/noteimages/2025/01/21/17-20-39-20ab579669a459c7fb54afeab21dcd4e.gif)#6 Remote Code Execution by Polluting `location_cache` and OS Environment Variable `BROWSER`By polluting the cached data in the `location_cache` object located at [unicorn_view.py](https://github.com/adamghill/django-unicorn/blob/ba2e1de5858f65b7d115f2ba782c220addd47245/django_unicorn/components/unicorn_view.py#L42C1-L43C1), attackers can archieve an arbitrary module importation as the logic executed at [_get_component_class](https://github.com/adamghill/django-unicorn/blob/ba2e1de5858f65b7d115f2ba782c220addd47245/django_unicorn/components/unicorn_view.py#L835) function. Then a following pollution on the `BROWSER` os environment variable will lead to remote code execution when it is combined with `antigravity` module importation.Pollute `location_cache._Cache__data.todo` as an array where the first element is the module name imported whenever a `GET` request is sent to the server.Pollute `BROWSER` os environment variable where the payload for command injection is set.![django-unicorn-rce](https://github.com/user-attachments/assets/8ad88609-c399-4852-8dd4-7fbc59cb28ae)MitigationThe patch could be:Blocking paths that start with `__`, which represent **double under (dunder)** or **magic variables/methods**Set a blacklist for the path, such as `RESTRICTED_KEYS = ("__globals__", "__builtins__")` adopted by [pydash](https://github.com/dgilland/pydash/blob/f4112f61ddb02e5181e781709d775838c9978b97/src/pydash/helpers.py#L211).Related MaterialsFor more information about class pollution please refer to:[1] [CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes](https://cwe.mitre.org/data/definitions/915.html)[2] [Report: Class Pollution leading to RCE in pydash](https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca)[3] [Blog: Prototype Pollution in Python](https://blog.abdulrah33m.com/prototype-pollution-in-python/)[4] [Blog: Class Pollution Gadgets in Jinja Leading to RCE](https://www.offensiveweb.com/docs/programming/python/class-pollution/)
[]
9.3
null
null
null
CVE-2024-33788
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the PinCode parameter at /API/info form endpoint.
[ "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-j6q9-g64f-w437
An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation.
[]
null
6.5
null
null
GHSA-ppfw-543c-9q84
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
[]
null
8
null
null
CVE-1999-0528
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.
[]
null
null
null
7.5
GHSA-c3xh-rcgh-wg6r
All versions of NVIDIA GPU Display Driver contain a vulnerability in the kernel mode layer handler where improper access controls allowing unprivileged user to cause a denial of service.
[]
null
null
6.5
null
GHSA-5cpc-fv98-27hq
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to missing bounds checking on buffer operations. An attacker could write past the boundaries of allocated buffer regions in memory, causing a program crash.
[]
null
7.1
null
null
GHSA-8937-22rp-f6j9
Information exposure vulnerability in SYNO.Core.Desktop.SessionData in Synology DiskStation Manager (DSM) before 6.1.6-15266 allows remote attackers to steal credentials via unspecified vectors.
[]
null
null
9.8
null
RHSA-2025:3506
Red Hat Security Advisory: kernel security update
kernel: md: fix deadlock between mddev_suspend and flush bio
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
CVE-2014-5985
The Animal Kaiser Zangetsu (aka com.wAnimalKaiserZangetsu) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:topappsbuilder_project:animal_kaiser_zangetsu:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-rfqg-6vj5-83j7
An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.
[]
null
null
7.5
null
CVE-2016-3176
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
[ "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:saltstack:salt:2015.8.7:*:*:*:*:*:*:*" ]
null
null
5.6
4.3
GHSA-3gw9-qvrp-jvcf
The LIFE TIME FITNESS (aka com.lifetimefitness.ltfmobile) application 1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-q83h-4xvh-fc8w
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.
[]
null
7.8
null
null
CVE-2024-11889
My IDX Home Search <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The My IDX Home Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'homeasap-idx-search' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2018-10948
Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs.
[ "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.0:beta1:*:*:*:*:*:*" ]
null
null
4.8
3.5
CVE-2020-13917
rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
[ "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2017-4936
VMware Workstation (12.x before 12.5.8) and Horizon View Client for Windows (4.x before 4.6.1) contain an out-of-bounds read vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client.
[ "cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:horizon_view:4.0.0:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.1:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.2:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.3:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.4:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.5:*:*:*:*:windows:*:*", "cpe:2.3:a:vmware:horizon_view:4.6:*:*:*:*:windows:*:*" ]
null
null
7.8
6.9
GHSA-mvf5-gghf-8mrf
Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/user/manage_user.php:4.
[]
null
7.2
null
null
CVE-2014-5328
Buffer overflow in the Webserver component on the Huawei E5332 router before 21.344.27.00.1080 allows remote authenticated users to cause a denial of service (reboot) via a long parameter in an API service request message.
[ "cpe:2.3:o:huawei:e5332_firmware:21.344.19.00.1080:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:e5332:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-j899-9773-9wjf
An improper authorization in the receiver component of Email.Product: AndroidVersions: Android SoCAndroid ID: A-149813048
[]
null
null
null
null
GHSA-vhvx-3gm7-4cq5
In all Qualcomm products with Android releases from CAF using the Linux kernel, when accessing the sde_rotator debug interface for register reading with multiple processes, one process can free the debug buffer while another process still has the debug buffer in use.
[]
null
null
7.8
null
GHSA-7vw2-49p7-mvf9
Vulnerability in the Hyperion Lifecycle Management product of Oracle Hyperion (component: Shared Services). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Lifecycle Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Lifecycle Management accessible data. CVSS 3.1 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N).
[]
null
null
null
null
GHSA-j425-965m-rmg6
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
[]
null
7.5
null
null
GHSA-q5p9-89cw-6chm
Null pointer dereference in the FPGA kernel driver for Intel(R) Quartus(R) Prime Pro Edition before version 19.3 may allow an authenticated user to potentially enable denial of service via local access.
[]
null
5.5
null
null
GHSA-8vv8-q6f3-9jjg
An Argument Injection or Modification vulnerability in the "Change Secret" username field as used in the Discovery component of Device42 CMDB allows a local attacker to run arbitrary code on the appliance with root privileges. This issue affects: Device42 CMDB version 18.01.00 and prior versions.
[]
null
9.1
null
null
CVE-2018-16857
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
null
7.4
null
CVE-2003-1604
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
GHSA-wqgg-8638-f2vf
In the Linux kernel, the following vulnerability has been resolved:HID: corsair-void: Add missing delayed work cancel for headset statusThe cancel_delayed_work_sync() call was missed, causing a use-after-free in corsair_void_remove().
[]
null
7.8
null
null
GHSA-79h6-9x4m-hjv8
Acoustica MP3 Audio Mixer 1.0 and possibly 2.471 allows remote attackers to cause a denial of service (crash) via a long string in a .sgp playlist file.
[]
null
null
null
null
GHSA-33pj-qgph-f4cq
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the component /dede/module_main.php
[]
null
8.8
null
null
CVE-2023-21878
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-hh37-cm5v-2qrh
Emacs 24.4 allows remote attackers to bypass security restrictions.
[]
null
null
7.5
null
GHSA-7cwc-82pf-56c6
SAP Disclosure Management (before version 10.1 Stack 1301) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[]
null
null
5.4
null
GHSA-46q3-4wpc-px2v
In GraphicsMagick 1.3.27a, there is a heap-based buffer over-read in ReadOneJNGImage in coders/png.c, related to oFFs chunk allocation.
[]
null
null
8.8
null
CVE-2011-1794
Integer overflow in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted dimensions.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2011-5251
Open redirect vulnerability in forum/login.php in vBulletin 4.1.3 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter in a lostpw action.
[ "cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:4.1.2:*:*:*:*:*:*:*" ]
null
null
null
5.8
RHSA-2008:0207
Red Hat Security Advisory: firefox security update
Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2025-32776
OpenRazer Vulnerable to Out of Bounds Read
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attacker can cause the custom kernel driver to read more bytes than provided by user space. This data will be written into the RGB arguments which will be sent to the USB device. This issue has been patched in v3.10.2.
[]
null
5.5
null
null
GHSA-pj2p-4hq9-w6vq
XML external entity (XXE) vulnerability in the import package functionality of the deployment module in Lansweeper before 6.0.100.67 allows remote authenticated users to obtain sensitive information, cause a denial of service, conduct server-side request forgery (SSRF) attacks, conduct internal port scans, or have unspecified other impact via an XML request, aka bug #572705.
[]
null
null
9.9
null
CVE-2014-5923
The Facebook Status Via (aka com.StatusViaAdvanced) application 3.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:statusvia:facebook_status_via:3.5:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2019-16115
In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.
[ "cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2016-9798
In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
[ "cpe:2.3:a:bluez:bluez:5.42:*:*:*:*:*:*:*" ]
null
null
5.3
5
RHSA-2019:1201
Red Hat Security Advisory: qemu-kvm-rhev security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
3.8
null
GHSA-w333-9jrf-6g2w
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX pfcdd kernel extension to cause a denial of service. IBM X-Force ID: 239170.
[]
null
6.2
null
null
CVE-2014-1517
The login form in Bugzilla 2.x, 3.x, 4.x before 4.4.3, and 4.5.x before 4.5.3 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then submit a vulnerability report, related to a "login CSRF" issue.
[ "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:-:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2024-33921
WordPress ReviewX plugin <= 1.6.21 - Broken Access Control vulnerability
Broken Access Control vulnerability in ReviewX.This issue affects ReviewX: from n/a through 1.6.21.
[]
null
4.3
null
null
CVE-2013-5418
Cross-site scripting (XSS) vulnerability in the Administrative console in IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.31, 8.0 before 8.0.0.8, and 8.5 before 8.5.5.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2025-6287
PHPGurukul COVID19 Testing Management System Take Action test-details.php cross site scripting
A vulnerability classified as problematic was found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /test-details.php of the component Take Action. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
3.5
3.5
4
RHSA-2024:8157
Red Hat Security Advisory: kernel security update
kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: ibmvnic: Add tx check to prevent skb leak kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.3
null
null
CVE-2024-49894
drm/amd/display: Fix index out of bounds in degamma hardware format translation
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in degamma hardware format translation Fixes index out of bounds issue in `cm_helper_translate_curve_to_degamma_hw_format` function. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds the function returns false to indicate an error. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-8mmw-rg27-gmpp
The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
[]
null
null
null
null
GHSA-q5p5-xg93-2jqc
Apache InLong Improper Privilege Management vulnerability
Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.  When the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login request and following it with a subsequent HTTP request using the returned cookie.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 to solve it.
[]
null
9.8
null
null
GHSA-4hf9-h8qr-hqwr
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chad Butler WP-Members allows Stored XSS. This issue affects WP-Members: from n/a through 3.5.4.
[]
null
6.5
null
null
CVE-2008-1550
Multiple cross-site scripting (XSS) vulnerabilities in index.php in CubeCart 4.2.1 allow remote attackers to inject arbitrary web script or HTML via (1) the _a parameter in a searchStr action and the (2) Submit parameter.
[ "cpe:2.3:a:cubecart:cubecart:4.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gmfg-97fg-3325
SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sort_bloques/, parameter list.
[]
null
9.8
null
null
GHSA-j3qc-3vf3-5gch
Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
[]
null
5.1
null
null
CVE-2023-35333
MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:pandocupload:*:*:*:*:*:mediawiki:*:*" ]
null
8.8
null
null
CVE-2017-7529
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
[ "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-338x-q4qx-prw7
A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/dataPerm/list
[]
null
9.8
null
null
CVE-2024-37332
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2009-3268
Google Chrome 1.0.154.48 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an automatically submitted form containing a KEYGEN element, a related issue to CVE-2009-1828.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rvr5-3x74-jw4c
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. System services may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200024 (November 2020).
[]
null
null
null
null
GHSA-hw84-c76j-h87p
The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the several functions in versions up to, and including, 6.20.01. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to edit plugin settings, including storing cross-site scripting, in multisite environments.
[]
null
6.5
null
null
GHSA-pwjh-vjhv-xqmx
PlutoSVG commit 336c02997277a1888e6ccbbbe674551a0582e5c4 and before was discovered to contain an integer overflow via the component plutosvg_load_from_memory.
[]
null
9.8
null
null
GHSA-559x-w225-82hw
Cross-site scripting (XSS) vulnerability in the Calendar module in Olat 7.8.0.1 (b20130821 N1) allows remote attackers to inject arbitrary web script or HTML via the Location field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-qrr8-87qr-7r3c
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 4 of 4).
[]
null
9.8
null
null
CVE-2013-4766
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
[ "cpe:2.3:a:eucalyptus:eucalyptus:*:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:3.2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-1999-0699
The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
[ "cpe:2.3:a:bluestone:sapphire_web:5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-5m9p-83f2-h69j
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow an attacker to gain root access by running a crafted binary leveraging an exported function from a shared library. The attacker must have shell access to the device in order to exploit this vulnerability.
[]
null
6.7
null
null
GHSA-cgh7-rgqg-hrcx
Path traversal allows exploiting XXE vulnerability in Jenkins Job Configuration History Plugin
Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict 'timestamp' query parameters in multiple endpoints, allowing attackers with to delete attacker-specified directories on the Jenkins controller file system as long as they contain a file called 'history.xml'.
[]
null
6.5
null
null
GHSA-g55g-4c57-8ccx
Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.
[]
null
6.6
null
null
GHSA-qrm4-m4fg-rjcv
Improper Privilege Management vulnerability in Astoundify Simple Registration for WooCommerce allows Privilege Escalation.This issue affects Simple Registration for WooCommerce: from n/a through 1.5.6.
[]
null
9.8
null
null
CVE-2006-6238
The AutoFill feature in Apple Safari 2.0.4 does not properly verify that all automatically populated form fields are visible to the user, which allows remote attackers to obtain sensitive information, such as usernames and passwords, via input fields of zero width, a variant of CVE-2006-6077.
[ "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-5458
SQL injection vulnerability in sqrl_verify.php in php-sqrl allows remote attackers to execute arbitrary SQL commands via the message parameter.
[ "cpe:2.3:a:php-sqrl_project:php-sqrl:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-gf32-wqg4-cx7w
orderdetails.aspx, as made available to Microsoft .NET developers as example code and demonstrated on www.ibuyspystore.com, allows remote attackers to view the orders of other users by modifying the OrderID parameter.
[]
null
null
null
null
GHSA-g544-5jqq-vgcm
JSON++ through 2016-06-15 has a buffer over-read in yyparse() in json.y.
[]
null
null
9.8
null
GHSA-h5v2-mw4c-6j57
Rejected reason: Not used
[]
null
null
null
null
GHSA-8c75-6g3x-hfp2
An issue was discovered in perfSONAR Monitoring and Debugging Dashboard (MaDDash) 2.0.2. A direct request to /etc/ provides a directory listing.
[]
null
null
5.3
null
CVE-2020-22570
Memcached 1.6.0 before 1.6.3 allows remote attackers to cause a denial of service (daemon crash) via a crafted meta command.
[ "cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-4xh9-5vh8-3p58
Yii Framework Reflected XSS
Reflected Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.11, when development mode is used, allows remote attackers to inject arbitrary web script or HTML via crafted request data that is mishandled on the debug-mode exception screen.
[]
null
null
6.1
null
RHSA-2016:2117
Red Hat Security Advisory: openstack-manila-ui security update
openstack-manila-ui: persistent XSS in metadata field
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
4.1
null
CVE-2024-11607
GTPayment Donations <= 1.0.0 - Stored XSS via CSRF
The GTPayment Donations WordPress plugin through 1.0.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[]
null
6.1
null
null
CVE-2020-35609
A denial-of-service vulnerability exists in the asynchronous ioctl functionality of Microsoft Azure Sphere 20.05. A sequence of specially crafted ioctl calls can cause a denial of service. An attacker can write shellcode to trigger this vulnerability.
[ "cpe:2.3:a:microsoft:azure_sphere:20.05:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2016-8466
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31822524. References: B-RB#105268.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
null
null
7
7.6
GHSA-xj6q-9hx8-mm7f
Directory Traversal in liuyaserver
Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
null
null
GHSA-xj9v-6q2f-vqhx
wifey vulnerable to Command Injection due to improper input sanitization
All versions of the package wifey are vulnerable to Command Injection via the `connect()` function due to improper input sanitization.
[]
null
9.8
null
null
CVE-2011-2135
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2025-2920
Netis WF-2404 passwd weak hash
A vulnerability was found in Netis WF-2404 1.1.124EN. It has been rated as problematic. This issue affects some unknown processing of the file /еtc/passwd. The manipulation leads to use of weak hash. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
1
2
2
1.2
CVE-2024-26678
x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
In the Linux kernel, the following vulnerability has been resolved: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section The .compat section is a dummy PE section that contains the address of the 32-bit entrypoint of the 64-bit kernel image if it is bootable from 32-bit firmware (i.e., CONFIG_EFI_MIXED=y) This section is only 8 bytes in size and is only referenced from the loader, and so it is placed at the end of the memory view of the image, to avoid the need for padding it to 4k, which is required for sections appearing in the middle of the image. Unfortunately, this violates the PE/COFF spec, and even if most EFI loaders will work correctly (including the Tianocore reference implementation), PE loaders do exist that reject such images, on the basis that both the file and memory views of the file contents should be described by the section headers in a monotonically increasing manner without leaving any gaps. So reorganize the sections to avoid this issue. This results in a slight padding overhead (< 4k) which can be avoided if desired by disabling CONFIG_EFI_MIXED (which is only needed in rare cases these days)
[]
null
5.5
null
null
RHSA-2017:0293
Red Hat Security Advisory: kernel security update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
GHSA-3657-q433-mmpx
Canvs Canvas Cross-site Scripting (XSS) via title and content fields
cnvs.io Canvas 3.3.0 has XSS in the title and content fields of a "Posts > Add New" action, and during creation of new tags and users.
[]
null
null
5.4
null
CVE-2019-4668
IBM UrbanCode Deploy (UCD) 7.0.4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171250.
[ "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*" ]
null
null
6.2
null
GHSA-x4mv-6wgm-7pj2
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11784, and CVE-2017-11785.
[]
null
null
5.5
null
GHSA-gw5g-54qg-7583
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
[]
null
null
5.9
null
GHSA-8rvw-f3jq-rcm7
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
[]
null
null
null
null
RHSA-2015:1499
Red Hat Security Advisory: chromium-browser security update
ICU: Uninitialized memory read fixed in Chrome 44.0.2403.89 chromium-browser: Heap-buffer-overflow in pdfium chromium-browser: Use-after-free related to unexpected GPU process termination in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Settings allowed executable files to run immediately after download in unsepcified chromium-browser: Use-after-free in IndexedDB. chromium-browser: Use-after-free in accessibility. chromium-browser: URL spoofing using pdf files in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Memory corruption in skia chromium-browser: CSP bypass in unspecified component chromium-browser: Use-after-free in pdfium. chromium-browser: Heap-buffer-overflow in expat. chromium-browser: Use-after-free in blink. chromium-browser: Information leak in XSS auditor. chromium-browser: UXSS in blink. chromium-browser: SOP bypass with CSS in unspecified chromium-browser: Spell checking dictionaries fetched over HTTP in unspecified chromium-browser: Various fixes from internal audits, fuzzing and other initiatives chromium-browser: v8 denial of service
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null