id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-xmgx-2283-p55h
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
[]
null
7.8
null
null
CVE-2014-6906
The Loli Chocolate Cake (aka com.alison.kang.chocolatecake) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:loli_chocolate_cake_project:loli_chocolate_cake:1.0.0:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-8m78-gp85-6cv4
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected.
[]
null
null
null
null
CVE-2017-5188
OBS worker VM escape via relative symbolic links
The bs_worker code in open build service before 20170320 followed relative symlinks, allowing reading of files outside of the package source directory during build, allowing leakage of private information.
[ "cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*" ]
null
null
5
null
CVE-2016-2105
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:-:*:*:*" ]
null
7.5
null
5
GHSA-rvvq-vmff-393g
CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could cause communications to stop when malicious packets are sent to the webserver of the device.
[]
8.7
7.5
null
null
CVE-2018-3820
Kibana versions after 6.1.0 and before 6.1.3 had a cross-site scripting (XSS) vulnerability in labs visualizations that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
[ "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2017-8924
The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
4.6
2.1
GHSA-3jxv-2g3q-q23g
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
[]
null
null
null
null
GHSA-prjf-h86p-335v
MultiTech Conduit MTCDT-LVW2-24XX 1.4.17-ocea-13592 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Debug Options page and entering shell metacharacters in the interface JSON field of the ping function.
[]
null
null
null
null
RHSA-2006:0682
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
GHSA-8c88-9jmc-phqr
Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.
[]
null
7.1
null
null
GHSA-64jp-4xjj-prcw
Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock.
[]
null
null
6.5
null
GHSA-xhr2-gj6g-mm67
The issue was addressed with additional user controls. This issue is fixed in macOS Big Sur 11.0.1. Users may be unable to remove metadata indicating where files were downloaded from.
[]
null
5.5
null
null
CVE-2022-34255
Adobe Commerce Improper Access Control Privilege escalation
Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Access Control vulnerability that could result in Privilege escalation. An attacker with a low privilege account could leverage this vulnerability to perform an account takeover for a victim. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.7:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.7:p1:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.7:p2:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.7:p3:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.3:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.3:p1:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.3:p2:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.4:-:*:*:commerce:*:*:*" ]
null
8.8
null
null
GHSA-r74c-ppq4-773h
A vulnerability was found in nickzren alsdb. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version v2 is able to address this issue. The name of the patch is cbc79a68145e845f951113d184b4de207c341599. It is recommended to upgrade the affected component. The identifier VDB-218429 was assigned to this vulnerability.
[]
null
9.8
null
null
CVE-2025-45011
A HTML Injection vulnerability was discovered in the foreigner-search.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the searchdata POST request parameter.
[]
null
5.3
null
null
GHSA-35p9-hh46-pwm3
Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure.
[]
null
null
null
null
GHSA-4m45-v7m2-3276
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit.This issue affects Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit: from n/a through 2.6.1.
[]
null
7.6
null
null
GHSA-5mxj-882h-8j58
The Quest Federal CU Mobile (aka com.metova.cuae.questfcu) application 1.0.27 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-w6pm-24jj-872h
A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.
[]
6.3
3.1
null
null
CVE-2017-20063
Elefant CMS File Upload drop privileges management
A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[ "cpe:2.3:a:elefantcms:elefant_cms:1.3.12:rc:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-3j29-j9r5-2r42
A vulnerability was found in Beijing Baichuo Smart S150 Management Platform up to 20240101. It has been rated as critical. Affected by this issue is some unknown functionality of the file /useratte/userattestation.php of the component HTTP POST Request Handler. The manipulation of the argument web_img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249866 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
6.3
null
null
GHSA-m22h-f8jw-65vm
xbru in BRU Workstation 17.0 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the xbru_dscheck.dd temporary file.
[]
null
null
null
null
CVE-2014-8940
Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (names and details of projects) by visiting the /update.log URI.
[ "cpe:2.3:a:piwigo:lexiglot:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2008-5579
Absolute path traversal vulnerability in mini-pub.php/front-end/cat.php in mini-pub 0.3 allows remote attackers to read arbitrary files via a full pathname in the sFileName parameter.
[ "cpe:2.3:a:mini-pub:mini-pub:0.3:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2018:0582
Red Hat Security Advisory: rh-maven35-slf4j security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2025:4341
Red Hat Security Advisory: kernel security update
kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: ipvs: properly dereference pe in ip_vs_add_service kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: ELF: fix kernel.randomize_va_space double read kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8
null
null
CVE-2011-4343
Information disclosure vulnerability in Apache MyFaces Core 2.0.1 through 2.0.10 and 2.1.0 through 2.1.4 allows remote attackers to inject EL expressions via crafted parameters.
[ "cpe:2.3:a:apache:myfaces:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:2.1.4:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-c9r8-cg3x-whrc
The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
[]
null
4.7
null
null
GHSA-92m3-4hrq-4449
A stored XSS in the process overview (bersicht zugewiesener Vorgaenge) in mbsupport openVIVA c2 20220101 allows a remote, authenticated, low-privileged attacker to execute arbitrary code in the victim's browser via name field of a process.
[]
null
5.4
null
null
CVE-2016-7076
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
[ "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*" ]
null
null
6.4
null
CVE-2018-11816
Use After Free in Video
Crafted Binder Request Causes Heap UAF in MediaServer
[ "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8039_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar6003_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-27352
Simple House Rental System v1 was discovered to contain an arbitrary file upload vulnerability via /app/register.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:simple_house_rental_system_project:simple_house_rental_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2020-3870
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. Processing a maliciously crafted image may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2022-37969
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-vq8p-qg57-9728
In the Linux kernel, the following vulnerability has been resolved:nvmet: always initialize cqe.resultThe spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA.Let's make RDMA behave the same and thus explicitly initializing the result field. This prevents leaking any data from the stack.
[]
null
null
null
null
GHSA-h3v9-jv3m-hmqg
Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (buffer overflow) by leveraging guest OS privileges, aka "Hyper-V Buffer Overflow Vulnerability."
[]
null
null
null
null
CVE-2023-31166
Improper Limitation of a Pathname to a Restricted Directory
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to create folders in arbitrary paths of the file system. See SEL Service Bulletin dated 2022-11-15 for more details.
[ "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*" ]
null
4.1
null
null
GHSA-pcvx-6pjw-cvh6
An elevation of privilege vulnerability in Bluetooth could enable a proximate attacker to manage access to documents on the device. This issue is rated as Moderate because it first requires exploitation of a separate vulnerability in the Bluetooth stack. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32612586.
[]
null
null
5.3
null
CVE-2018-17921
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that may allow an attacker to force-pair the device without human interaction.
[ "cpe:2.3:o:sagaradio:saga1-l8b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sagaradio:saga1-l8b:-:*:*:*:*:*:*:*" ]
null
8.8
null
5.8
CVE-2014-3954
Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.
[ "cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:rc2:*:*:*:*:*:*" ]
null
null
null
10
GHSA-x9r9-442m-mrww
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
[]
null
null
null
null
GHSA-r6mj-698m-2p3q
Xaomi Mi Browser v13.10.0-gn contains a vulnerability which allows attackers to execute arbitrary code via user interaction with a crafted URL.
[]
null
8.8
null
null
CVE-2024-22475
Cross-site request forgery vulnerability in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. allows a remote unauthenticated attacker to perform unintended operations on the affected product. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
[]
null
6.1
null
null
CVE-2023-36564
Windows Search Security Feature Bypass Vulnerability
Windows Search Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-3x98-xr5x-2c7r
Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors.
[]
null
null
null
null
GHSA-vfm9-p9ff-pcp8
The Newsletter2Go plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'resetStyles' AJAX action in all versions up to, and including, 4.0.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset styles.
[]
null
4.3
null
null
GHSA-gfm2-2cmr-j6jf
A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click. This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1.
[]
4.6
3.5
null
null
CVE-2024-56803
Ghostty improperly handles window title sequences which can lead to arbitrary command execution
Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the "enter" key. Fixed in Ghostty v1.0.1.
[]
5.1
null
null
null
CVE-2021-34291
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Gif_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing GIF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12956)
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-46c3-5xc5-wwhv
Apache Airflow: Sensitive configuration values are not masked in the logs by default
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability. If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets.
[]
null
7.5
null
null
GHSA-44rm-j4gx-rrg2
Incorrect access control in the component /rest/staffResource/update of Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows create and modify user accounts, including an Administrator account.
[]
null
8.1
null
null
GHSA-rhq2-6v39-r537
The Easy Digital Downloads (EDD) Quota theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
[]
null
6.1
null
null
CVE-2024-33630
WordPress Piotnet Addons For Elementor plugin <= 2.4.26 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.26.
[ "cpe:2.3:a:piotnet:piotnet_addons_for_elementor:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-9xmm-8mw4-qgc6
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
[]
null
null
null
null
GHSA-wxh7-2jp7-rww4
Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.
[]
null
null
null
null
CVE-2023-42834
A privacy issue was addressed with improved handling of files. This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
GHSA-8x2c-w88q-3x85
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[]
null
null
8.8
null
GHSA-7q82-w593-4rh5
Race condition in the International Components for Unicode (ICU) functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
null
null
null
GHSA-3m9x-xqwx-4x9c
A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
[]
8.7
8.8
null
null
GHSA-2wcg-78mh-f9m8
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.
[]
null
null
null
null
GHSA-f2h9-j7xj-q6g3
An issue was discovered in certain Apple products. iOS before 11.2.6 is affected. macOS before 10.13.3 Supplemental Update is affected. tvOS before 11.2.6 is affected. watchOS before 4.2.3 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a crafted string containing a certain Telugu character.
[]
null
null
9.8
null
GHSA-4r76-hhh5-w3m9
Microsoft Commercial Internet System (MCIS) IMAP server allows remote attackers to cause a denial of service via a malformed IMAP request.
[]
null
null
null
null
GHSA-598m-m5h8-fc92
The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.
[]
null
null
null
null
CVE-2024-29991
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
5
null
null
GHSA-7hp3-phw2-32fm
Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the WSCView/Save function.
[]
null
7.5
null
null
CVE-2021-34228
Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field.
[ "cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2003-0796
Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled.
[ "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2005:141
Red Hat Security Advisory: rh-postgresql security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
CVE-2023-41322
Privilege Escalation from technician to super-admin in GLPI
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
RHSA-2007:0001
Red Hat Security Advisory: openoffice.org security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2020-6402
Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2025-4338
Lantronix Device Installer Improper Restriction of XML External Entity Reference
Lantronix Device installer is vulnerable to XML external entity (XXE) attacks in configuration files read from the network device. An attacker could obtain credentials, access these network devices, and modify their configurations. An attacker may also gain access to the host running the Device Installer software or the password hash of the user running the application.
[]
6.9
6.8
null
null
CVE-2024-11441
Stored XSS in Serge in serge-chat/serge
A stored cross-site scripting (XSS) vulnerability exists in Serge version 0.9.0. The vulnerability is due to improper neutralization of input during web page generation in the chat prompt. An attacker can exploit this vulnerability by sending a crafted message containing malicious HTML/JavaScript code, which will be stored and executed whenever the chat is accessed, leading to unintended content being shown to the user and potential phishing attacks.
[]
null
null
6.1
null
CVE-2024-35555
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/share_switch.php?mudi=switch&dataType=newsWeb&fieldName=state&fieldName2=state&tabName=infoWeb&dataID=40.
[ "cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-p5cv-767r-2fpm
Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.
[]
null
null
null
null
GHSA-qm9g-29cj-wvp4
Bugzilla 3.2 before 3.2 RC2, 3.0 before 3.0.6, 2.22 before 2.22.6, 2.20 before 2.20.7, and other versions after 2.17.4 allows remote authenticated users to bypass moderation to approve and disapprove quips via a direct request to quips.cgi with the action parameter set to "approve."
[]
null
null
null
null
GHSA-q4gh-2cv2-8pcv
Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. This issue affects: GateManager all versions prior to 9.7.
[]
null
4.9
null
null
GHSA-32ch-6x54-q4h9
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
[]
null
4.3
null
null
ICSA-23-005-02
Hitachi Energy FOXMAN-UN
The affected Hitachi Energy FOXMAN-UN products use the DES cypher to encrypt user credentials used to access the network elements. DES is no longer considered secure due to a short 56-bit key, which could allow the cypher to be decrypted in a short time.-CVE-2021-40341 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy FOXMAN-UN products use a DES implementation with a default key for encryption. An attacker that exploits this vulnerability could obtain sensitive information and gain access to network elements managed by the FOXMAN-UN.-CVE-2021-40342 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy FOXMAN-UN products contain public and private keys used to sign and protect custom parameter set (CPS) files from modification. An attacker that exploits this vulnerability could change the CPS file and sign it, so it is trusted as a legitimate CPS file.-CVE-2022-3927 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). The message queue of affected Hitachi Energy FOXMAN-UN products contains a hard-coded credential. An attacker that exploits this vulnerability could access data from the internal message queue.-CVE-2022-3928 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Communication between the client (FOXMAN-UN User Interface) and the server application (FOXMAN-UN Core) partially uses common object request broker architecture CORBA (CORBA) over TCP/IP. This protocol is not encrypted and could allow an unauthorized user to trace internal messages.-CVE-2022-3929 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
8.3
null
GHSA-v5gq-732w-q78g
Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file.
[]
null
null
8.8
null
CVE-2024-6873
Specially crafted request could caused undefined behaviour which may lead to Remote Code Execution.
It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code has been produced or exploited.  Fixes have been merged to all currently supported version of ClickHouse. If you are maintaining your own forked version of ClickHouse or using an older version and cannot upgrade, the fix for this vulnerability can be found in this commit  https://github.com/ClickHouse/ClickHouse/pull/64024 .
[]
null
8.1
null
null
CVE-2016-4969
Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php.
[ "cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-mccv-36h3-rfv5
Information Disclosure in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to read the WiFi passphrase via the UART Debugging Port.
[]
null
4.6
null
null
CVE-2020-2499
Hard-coded Password Vulnerability in QES
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
[ "cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*", "cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*", "cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*", "cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*", "cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*", "cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-chr6-386q-4m3v
Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[]
null
6.8
null
null
CVE-2024-47753
media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning Fix a smatch static checker warning on vdec_vp8_req_if.c. Which leads to a kernel crash when fb is NULL.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-3jjr-jgj8-qpgr
Buffer overflow in Artweaver before 3.1.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted AWD file.
[]
null
null
null
null
GHSA-c3xg-4qmh-r995
Buffer overflow in eBay Enhanced Picture Services (aka EPUImageControl Class) in EUPWALcontrol.dll before 1.0.3.48, as used in Sell Your Item (SYI), Setup & Test eBay Enhanced Picture Services, Picture Manager Enhanced Uploader, and CARad.com Add Vehicle, allows remote attackers to execute arbitrary code via a crafted HTML document.
[]
null
null
null
null
CVE-2023-38344
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
[ "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-8p53-rhxf-cgxv
The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
[]
null
null
null
null
CVE-2020-13136
D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer.
[ "cpe:2.3:o:dlink:dsp-w215_firmware:1.26b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dsp-w215:a1:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-735j-4gjq-vc2q
A vulnerability was found in itsourcecode Restaurant Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/team_update.php. The manipulation of the argument team leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-67mm-c9vq-wpvp
IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 143797.
[]
null
null
7.1
null
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote attackers to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
[ "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-1000553
Trovebox version <= 4.0.0-rc6 contains a Server-Side request forgery vulnerability in webhook component that can result in read or update internal resources. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed.
[ "cpe:2.3:a:trovebox:trovebox:*:*:*:*:*:*:*:*", "cpe:2.3:a:trovebox:trovebox:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:trovebox:trovebox:4.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:trovebox:trovebox:4.0.0:rc6:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-frvg-5388-w525
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
6.5
null
CVE-2009-1409
SQL injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when "Extended User Fields" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the hide parameter, a different vector than CVE-2005-4224 and CVE-2008-5320.
[ "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.3_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.3_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.4_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.4_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.4_beta4:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.4_beta5:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.4_beta6:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:5.21:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2020-29613
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.3 and iPadOS 14.3. An enterprise application installation prompt may display the wrong domain.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3