id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-xmgx-2283-p55h | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable. | [] | null | 7.8 | null | null |
|
CVE-2014-6906 | The Loli Chocolate Cake (aka com.alison.kang.chocolatecake) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:loli_chocolate_cake_project:loli_chocolate_cake:1.0.0:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-8m78-gp85-6cv4 | Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected. | [] | null | null | null | null |
|
CVE-2017-5188 | OBS worker VM escape via relative symbolic links | The bs_worker code in open build service before 20170320 followed relative symlinks, allowing reading of files outside of the package source directory during build, allowing leakage of private information. | [
"cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*"
] | null | null | 5 | null |
CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:-:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-rvvq-vmff-393g | CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could
cause communications to stop when malicious packets are sent to the webserver of the device. | [] | 8.7 | 7.5 | null | null |
|
CVE-2018-3820 | Kibana versions after 6.1.0 and before 6.1.3 had a cross-site scripting (XSS) vulnerability in labs visualizations that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | [
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2017-8924 | The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
|
GHSA-3jxv-2g3q-q23g | Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15. | [] | null | null | null | null |
|
GHSA-prjf-h86p-335v | MultiTech Conduit MTCDT-LVW2-24XX 1.4.17-ocea-13592 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Debug Options page and entering shell metacharacters in the interface JSON field of the ping function. | [] | null | null | null | null |
|
RHSA-2006:0682 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-8c88-9jmc-phqr | Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code. | [] | null | 7.1 | null | null |
|
GHSA-64jp-4xjj-prcw | Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock. | [] | null | null | 6.5 | null |
|
GHSA-xhr2-gj6g-mm67 | The issue was addressed with additional user controls. This issue is fixed in macOS Big Sur 11.0.1. Users may be unable to remove metadata indicating where files were downloaded from. | [] | null | 5.5 | null | null |
|
CVE-2022-34255 | Adobe Commerce Improper Access Control Privilege escalation | Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Access Control vulnerability that could result in Privilege escalation. An attacker with a low privilege account could leverage this vulnerability to perform an account takeover for a victim. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:p2:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:p3:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.3:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.3:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.3:p2:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.4:-:*:*:commerce:*:*:*"
] | null | 8.8 | null | null |
GHSA-r74c-ppq4-773h | A vulnerability was found in nickzren alsdb. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version v2 is able to address this issue. The name of the patch is cbc79a68145e845f951113d184b4de207c341599. It is recommended to upgrade the affected component. The identifier VDB-218429 was assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2025-45011 | A HTML Injection vulnerability was discovered in the foreigner-search.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the searchdata POST request parameter. | [] | null | 5.3 | null | null |
|
GHSA-35p9-hh46-pwm3 | Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure. | [] | null | null | null | null |
|
GHSA-4m45-v7m2-3276 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit.This issue affects Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit: from n/a through 2.6.1. | [] | null | 7.6 | null | null |
|
GHSA-5mxj-882h-8j58 | The Quest Federal CU Mobile (aka com.metova.cuae.questfcu) application 1.0.27 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-w6pm-24jj-872h | A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue. | [] | 6.3 | 3.1 | null | null |
|
CVE-2017-20063 | Elefant CMS File Upload drop privileges management | A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [
"cpe:2.3:a:elefantcms:elefant_cms:1.3.12:rc:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-3j29-j9r5-2r42 | A vulnerability was found in Beijing Baichuo Smart S150 Management Platform up to 20240101. It has been rated as critical. Affected by this issue is some unknown functionality of the file /useratte/userattestation.php of the component HTTP POST Request Handler. The manipulation of the argument web_img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249866 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 6.3 | null | null |
|
GHSA-m22h-f8jw-65vm | xbru in BRU Workstation 17.0 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the xbru_dscheck.dd temporary file. | [] | null | null | null | null |
|
CVE-2014-8940 | Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (names and details of projects) by visiting the /update.log URI. | [
"cpe:2.3:a:piwigo:lexiglot:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2008-5579 | Absolute path traversal vulnerability in mini-pub.php/front-end/cat.php in mini-pub 0.3 allows remote attackers to read arbitrary files via a full pathname in the sFileName parameter. | [
"cpe:2.3:a:mini-pub:mini-pub:0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2018:0582 | Red Hat Security Advisory: rh-maven35-slf4j security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2025:4341 | Red Hat Security Advisory: kernel security update | kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: ipvs: properly dereference pe in ip_vs_add_service kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: ELF: fix kernel.randomize_va_space double read kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8 | null | null |
CVE-2011-4343 | Information disclosure vulnerability in Apache MyFaces Core 2.0.1 through 2.0.10 and 2.1.0 through 2.1.4 allows remote attackers to inject EL expressions via crafted parameters. | [
"cpe:2.3:a:apache:myfaces:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:myfaces:2.1.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-c9r8-cg3x-whrc | The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | [] | null | 4.7 | null | null |
|
GHSA-92m3-4hrq-4449 | A stored XSS in the process overview (bersicht zugewiesener Vorgaenge) in mbsupport openVIVA c2 20220101 allows a remote, authenticated, low-privileged attacker to execute arbitrary code in the victim's browser via name field of a process. | [] | null | 5.4 | null | null |
|
CVE-2016-7076 | sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges. | [
"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"
] | null | null | 6.4 | null |
|
CVE-2018-11816 | Use After Free in Video | Crafted Binder Request Causes Heap UAF in MediaServer | [
"cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8039_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar6003_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-27352 | Simple House Rental System v1 was discovered to contain an arbitrary file upload vulnerability via /app/register.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | [
"cpe:2.3:a:simple_house_rental_system_project:simple_house_rental_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2020-3870 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2022-37969 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Windows Common Log File System Driver Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-vq8p-qg57-9728 | In the Linux kernel, the following vulnerability has been resolved:nvmet: always initialize cqe.resultThe spec doesn't mandate that the first two double words (aka results)
for the command queue entry need to be set to 0 when they are not
used (not specified). Though, the target implemention returns 0 for TCP
and FC but not for RDMA.Let's make RDMA behave the same and thus explicitly initializing the
result field. This prevents leaking any data from the stack. | [] | null | null | null | null |
|
GHSA-h3v9-jv3m-hmqg | Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (buffer overflow) by leveraging guest OS privileges, aka "Hyper-V Buffer Overflow Vulnerability." | [] | null | null | null | null |
|
CVE-2023-31166 | Improper Limitation of a Pathname to a Restricted Directory | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to create folders in arbitrary paths of the file system.
See SEL Service Bulletin dated 2022-11-15 for more details. | [
"cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*"
] | null | 4.1 | null | null |
GHSA-pcvx-6pjw-cvh6 | An elevation of privilege vulnerability in Bluetooth could enable a proximate attacker to manage access to documents on the device. This issue is rated as Moderate because it first requires exploitation of a separate vulnerability in the Bluetooth stack. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32612586. | [] | null | null | 5.3 | null |
|
CVE-2018-17921 | SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that may allow an attacker to force-pair the device without human interaction. | [
"cpe:2.3:o:sagaradio:saga1-l8b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sagaradio:saga1-l8b:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 |
|
CVE-2014-3954 | Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message. | [
"cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:rc2:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-x9r9-442m-mrww | The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index. | [] | null | null | null | null |
|
GHSA-r6mj-698m-2p3q | Xaomi Mi Browser v13.10.0-gn contains a vulnerability which allows attackers to execute arbitrary code via user interaction with a crafted URL. | [] | null | 8.8 | null | null |
|
CVE-2024-22475 | Cross-site request forgery vulnerability in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. allows a remote unauthenticated attacker to perform unintended operations on the affected product. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. | [] | null | 6.1 | null | null |
|
CVE-2023-36564 | Windows Search Security Feature Bypass Vulnerability | Windows Search Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-3x98-xr5x-2c7r | Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors. | [] | null | null | null | null |
|
GHSA-vfm9-p9ff-pcp8 | The Newsletter2Go plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'resetStyles' AJAX action in all versions up to, and including, 4.0.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset styles. | [] | null | 4.3 | null | null |
|
GHSA-gfm2-2cmr-j6jf | A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click.
This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1. | [] | 4.6 | 3.5 | null | null |
|
CVE-2024-56803 | Ghostty improperly handles window title sequences which can lead to arbitrary command execution | Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the "enter" key. Fixed in Ghostty v1.0.1. | [] | 5.1 | null | null | null |
CVE-2021-34291 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Gif_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing GIF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12956) | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-46c3-5xc5-wwhv | Apache Airflow: Sensitive configuration values are not masked in the logs by default | Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability. If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets. | [] | null | 7.5 | null | null |
GHSA-44rm-j4gx-rrg2 | Incorrect access control in the component /rest/staffResource/update of Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows create and modify user accounts, including an Administrator account. | [] | null | 8.1 | null | null |
|
GHSA-rhq2-6v39-r537 | The Easy Digital Downloads (EDD) Quota theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. | [] | null | 6.1 | null | null |
|
CVE-2024-33630 | WordPress Piotnet Addons For Elementor plugin <= 2.4.26 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.26.
| [
"cpe:2.3:a:piotnet:piotnet_addons_for_elementor:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-9xmm-8mw4-qgc6 | The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process. | [] | null | null | null | null |
|
GHSA-wxh7-2jp7-rww4 | Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution. | [] | null | null | null | null |
|
CVE-2023-42834 | A privacy issue was addressed with improved handling of files. This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
GHSA-8x2c-w88q-3x85 | Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [] | null | null | 8.8 | null |
|
GHSA-7q82-w593-4rh5 | Race condition in the International Components for Unicode (ICU) functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [] | null | null | null | null |
|
GHSA-3m9x-xqwx-4x9c | A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | [] | 8.7 | 8.8 | null | null |
|
GHSA-2wcg-78mh-f9m8 | Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup. | [] | null | null | null | null |
|
GHSA-f2h9-j7xj-q6g3 | An issue was discovered in certain Apple products. iOS before 11.2.6 is affected. macOS before 10.13.3 Supplemental Update is affected. tvOS before 11.2.6 is affected. watchOS before 4.2.3 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a crafted string containing a certain Telugu character. | [] | null | null | 9.8 | null |
|
GHSA-4r76-hhh5-w3m9 | Microsoft Commercial Internet System (MCIS) IMAP server allows remote attackers to cause a denial of service via a malformed IMAP request. | [] | null | null | null | null |
|
GHSA-598m-m5h8-fc92 | The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability. | [] | null | null | null | null |
|
CVE-2024-29991 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
GHSA-7hp3-phw2-32fm | Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the WSCView/Save function. | [] | null | 7.5 | null | null |
|
CVE-2021-34228 | Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field. | [
"cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2003-0796 | Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. | [
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2005:141 | Red Hat Security Advisory: rh-postgresql security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2023-41322 | Privilege Escalation from technician to super-admin in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
RHSA-2007:0001 | Red Hat Security Advisory: openoffice.org security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2020-6402 | Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2025-4338 | Lantronix Device Installer Improper Restriction of XML External Entity Reference | Lantronix Device installer is vulnerable to XML external entity (XXE) attacks in configuration files read from the network device. An attacker could obtain credentials, access these network devices, and modify their configurations. An attacker may also gain access to the host running the Device Installer software or the password hash of the user running the application. | [] | 6.9 | 6.8 | null | null |
CVE-2024-11441 | Stored XSS in Serge in serge-chat/serge | A stored cross-site scripting (XSS) vulnerability exists in Serge version 0.9.0. The vulnerability is due to improper neutralization of input during web page generation in the chat prompt. An attacker can exploit this vulnerability by sending a crafted message containing malicious HTML/JavaScript code, which will be stored and executed whenever the chat is accessed, leading to unintended content being shown to the user and potential phishing attacks. | [] | null | null | 6.1 | null |
CVE-2024-35555 | idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/share_switch.php?mudi=switch&dataType=newsWeb&fieldName=state&fieldName2=state&tabName=infoWeb&dataID=40. | [
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-p5cv-767r-2fpm | Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started. | [] | null | null | null | null |
|
GHSA-qm9g-29cj-wvp4 | Bugzilla 3.2 before 3.2 RC2, 3.0 before 3.0.6, 2.22 before 2.22.6, 2.20 before 2.20.7, and other versions after 2.17.4 allows remote authenticated users to bypass moderation to approve and disapprove quips via a direct request to quips.cgi with the action parameter set to "approve." | [] | null | null | null | null |
|
GHSA-q4gh-2cv2-8pcv | Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. This issue affects: GateManager all versions prior to 9.7. | [] | null | 4.9 | null | null |
|
GHSA-32ch-6x54-q4h9 | When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | [] | null | 4.3 | null | null |
|
ICSA-23-005-02 | Hitachi Energy FOXMAN-UN | The affected Hitachi Energy FOXMAN-UN products use the DES cypher to encrypt user credentials used to access the network elements. DES is no longer considered secure due to a short 56-bit key, which could allow the cypher to be decrypted in a short time.-CVE-2021-40341 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy FOXMAN-UN products use a DES implementation with a default key for encryption. An attacker that exploits this vulnerability could obtain sensitive information and gain access to network elements managed by the FOXMAN-UN.-CVE-2021-40342 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy FOXMAN-UN products contain public and private keys used to sign and protect custom parameter set (CPS) files from modification. An attacker that exploits this vulnerability could change the CPS file and sign it, so it is trusted as a legitimate CPS file.-CVE-2022-3927 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). The message queue of affected Hitachi Energy FOXMAN-UN products contains a hard-coded credential. An attacker that exploits this vulnerability could access data from the internal message queue.-CVE-2022-3928 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Communication between the client (FOXMAN-UN User Interface) and the server application (FOXMAN-UN Core) partially uses common object request broker architecture CORBA (CORBA) over TCP/IP. This protocol is not encrypted and could allow an unauthorized user to trace internal messages.-CVE-2022-3929 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 8.3 | null |
GHSA-v5gq-732w-q78g | Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file. | [] | null | null | 8.8 | null |
|
CVE-2024-6873 | Specially crafted request could caused undefined behaviour which may lead to Remote Code Execution. | It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code has been produced or exploited.
Fixes have been merged to all currently supported version of ClickHouse. If you are maintaining your own forked version of ClickHouse or using an older version and cannot upgrade, the fix for this vulnerability can be found in this commit https://github.com/ClickHouse/ClickHouse/pull/64024 . | [] | null | 8.1 | null | null |
CVE-2016-4969 | Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php. | [
"cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-mccv-36h3-rfv5 | Information Disclosure in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to read the WiFi passphrase via the UART Debugging Port. | [] | null | 4.6 | null | null |
|
CVE-2020-2499 | Hard-coded Password Vulnerability in QES | A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later. | [
"cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-chr6-386q-4m3v | Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin | Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [] | null | 6.8 | null | null |
CVE-2024-47753 | media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning | In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning
Fix a smatch static checker warning on vdec_vp8_req_if.c.
Which leads to a kernel crash when fb is NULL. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-3jjr-jgj8-qpgr | Buffer overflow in Artweaver before 3.1.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted AWD file. | [] | null | null | null | null |
|
GHSA-c3xg-4qmh-r995 | Buffer overflow in eBay Enhanced Picture Services (aka EPUImageControl Class) in EUPWALcontrol.dll before 1.0.3.48, as used in Sell Your Item (SYI), Setup & Test eBay Enhanced Picture Services, Picture Manager Enhanced Uploader, and CARad.com Add Vehicle, allows remote attackers to execute arbitrary code via a crafted HTML document. | [] | null | null | null | null |
|
CVE-2023-38344 | An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access. | [
"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-8p53-rhxf-cgxv | The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c. | [] | null | null | null | null |
|
CVE-2020-13136 | D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer. | [
"cpe:2.3:o:dlink:dsp-w215_firmware:1.26b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsp-w215:a1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-735j-4gjq-vc2q | A vulnerability was found in itsourcecode Restaurant Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/team_update.php. The manipulation of the argument team leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-67mm-c9vq-wpvp | IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 143797. | [] | null | null | 7.1 | null |
|
CVE-2002-0189 | Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote attackers to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability. | [
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-1000553 | Trovebox version <= 4.0.0-rc6 contains a Server-Side request forgery vulnerability in webhook component that can result in read or update internal resources. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed. | [
"cpe:2.3:a:trovebox:trovebox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trovebox:trovebox:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:trovebox:trovebox:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:trovebox:trovebox:4.0.0:rc6:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-frvg-5388-w525 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | 6.5 | null |
|
CVE-2009-1409 | SQL injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when "Extended User Fields" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the hide parameter, a different vector than CVE-2005-4224 and CVE-2008-5320. | [
"cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.3_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.3_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.4_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:5.21:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2020-29613 | A logic issue was addressed with improved state management. This issue is fixed in iOS 14.3 and iPadOS 14.3. An enterprise application installation prompt may display the wrong domain. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.