id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-5q95-22v3-59qw | vim is vulnerable to Out-of-bounds Read | [] | null | 7.1 | null | null |
|
GHSA-74xr-5r7j-x39j | PHP-Nuke 5.x allows remote attackers to perform arbitrary SQL operations by modifying the "prefix" variable when calling any scripts that do not already define the prefix variable (e.g., by including mainfile.php), such as article.php. | [] | null | null | null | null |
|
GHSA-w7j5-jxx6-p7j4 | examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header. | [] | null | null | 8.8 | null |
|
GHSA-ph72-xjpc-54x2 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in cybio Gallery Widget allows SQL Injection. This issue affects Gallery Widget: from n/a through 1.2.1. | [] | null | 8.5 | null | null |
|
CVE-2022-28094 | SCBS Online Sports Venue Reservation System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the fid parameter at booking.php. | [
"cpe:2.3:a:online_sports_complex_booking_system_project:online_sports_complex_booking_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-6w9f-f6h2-8j9m | A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which might lead to memory corruption and other potential consequences. | [] | null | 8.8 | null | null |
|
GHSA-67rw-g94p-phv8 | In the Linux kernel, the following vulnerability has been resolved:mptcp: fix sleep in atomic at close timeMatt reported a splat at msk close time:We can't call mptcp_close under the 'fast' socket lock variant, replace
it with a sock_lock_nested() as the relevant code is already under the
listening msk socket lock protection. | [] | null | 5.5 | null | null |
|
GHSA-6r36-crx2-h5cg | The pmpro-membership-maps WordPress plugin before 0.7 does not prevent users with at least the contributor role from leaking sensitive information about users with a membership on the site. | [] | null | 6.5 | null | null |
|
GHSA-4fg5-9xqq-h6cq | Microsoft Office 98, Macintosh Edition, does not properly initialize the disk space used by Office 98 files and effectively inserts data from previously deleted files into the Office file, which could allow attackers to obtain sensitive information. | [] | null | null | null | null |
|
GHSA-phq2-gr84-gcwr | Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406. | [] | null | null | null | null |
|
CVE-2017-6067 | Symphony 2.6.9 has XSS in publish/notes/edit/##/saved/ via the bottom form field. | [
"cpe:2.3:a:getsymphony:symphony:2.6.9:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-73cw-j3wh-rf6g | In the Linux kernel, the following vulnerability has been resolved:bpf: Fix kmemleak warning for percpu hashmapVlad Poenaru reported the following kmemleak issue:unreferenced object 0x606fd7c44ac8 (size 32):
backtrace (crc 0):
pcpu_alloc_noprof+0x730/0xeb0
bpf_map_alloc_percpu+0x69/0xc0
prealloc_init+0x9d/0x1b0
htab_map_alloc+0x363/0x510
map_create+0x215/0x3a0
__sys_bpf+0x16b/0x3e0
__x64_sys_bpf+0x18/0x20
do_syscall_64+0x7b/0x150
entry_SYSCALL_64_after_hwframe+0x4b/0x53Further investigation shows the reason is due to not 8-byte aligned
store of percpu pointer in htab_elem_set_ptr():
*(void __percpu **)(l->key + key_size) = pptr;Note that the whole htab_elem alignment is 8 (for x86_64). If the key_size
is 4, that means pptr is stored in a location which is 4 byte aligned but
not 8 byte aligned. In mm/kmemleak.c, scan_block() scans the memory based
on 8 byte stride, so it won't detect above pptr, hence reporting the memory
leak.In htab_map_alloc(), we already haveSo storing pptr with 8-byte alignment won't cause any problem and can fix
kmemleak too.The issue can be reproduced with bpf selftest as well:Enable CONFIG_DEBUG_KMEMLEAK configAdd a getchar() before skel destroy in test_hash_map() in prog_tests/for_each.c.
The purpose is to keep map available so kmemleak can be detected.run './test_progs -t for_each/hash_map &' and a kmemleak should be reported. | [] | null | null | null | null |
|
CVE-2018-16706 | LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080. | [
"cpe:2.3:a:lg:supersign_cms:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2024-38549 | drm/mediatek: Add 0 size check to mtk_drm_gem_obj | In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
Add a check to mtk_drm_gem_init if we attempt to allocate a GEM object
of 0 bytes. Currently, no such check exists and the kernel will panic if
a userspace application attempts to allocate a 0x0 GBM buffer.
Tested by attempting to allocate a 0x0 GBM buffer on an MT8188 and
verifying that we now return EINVAL. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2025-6492 | MarkText index.js getRecommendTitleFromMarkdownString redos | A vulnerability has been found in MarkText up to 0.17.1 and classified as problematic. Affected by this vulnerability is the function getRecommendTitleFromMarkdownString of the file marktext/src/main/utils/index.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | 5.3 | 5 |
GHSA-wm49-p28j-wfgv | Cross-site Scripting (XSS) vulnerability in firmware section of Secomea GateManager allows logged in user to inject javascript in browser session. This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. | [] | null | 6.1 | null | null |
|
CVE-2018-9958 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Text Annotations. When setting the point attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5620. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2004-2146 | CRLF injection vulnerability in PD9 Software MegaBBS 2 and 2.1 allows attackers to conduct HTTP response splitting attacks via the fid parameter in a writenew action to thread-post.asp. | [
"cpe:2.3:a:pd9_software:megabbs:2:*:*:*:*:*:*:*",
"cpe:2.3:a:pd9_software:megabbs:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-862v-8qcr-m359 | Improper permission settings for mobile applications (com.transsion.carlcare) may lead toinformation leakage risk. | [] | null | 7.5 | null | null |
|
GHSA-66gw-8528-j2rp | An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem. | [] | null | 7.1 | null | null |
|
GHSA-7j2r-xvcc-fpw7 | PHP remote file inclusion vulnerability in Redaxo 2.7.4 allows remote attackers to execute arbitrary PHP code via a URL in the (1) REX[INCLUDE_PATH] parameter in (a) addons/import_export/pages/index.inc.php and (b) pages/community.inc.php. | [] | null | null | null | null |
|
GHSA-994h-mf2h-6f5r | The Password Protected – Ultimate Plugin to Password Protect Your WordPress Content with Ease plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Captcha Site Key in all versions up to, and including, 2.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] | null | 4.4 | null | null |
|
GHSA-7635-x5f9-5458 | A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness. | [] | null | 6.6 | null | null |
|
CVE-2025-7074 | vercel hyper rimraf-standalone.js ignoreMap redos | A vulnerability classified as problematic has been found in vercel hyper up to 3.4.1. This affects the function expand/braceExpand/ignoreMap of the file hyper/bin/rimraf-standalone.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 4.3 | 4.3 | 4 |
CVE-2016-9345 | An issue was discovered in Emerson DeltaV Easy Security Management DeltaV V12.3, DeltaV V12.3.1, and DeltaV V13.3. Critical vulnerabilities may allow a local attacker to elevate privileges within the DeltaV control system. | [
"cpe:2.3:a:emerson:deltav:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:12.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:13.3:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 |
|
GHSA-h49h-j7pc-4p78 | Missing Authorization vulnerability in NerdPress Social Pug allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Pug: from n/a through 1.30.0. | [] | null | 5.3 | null | null |
|
CVE-2014-3359 | Memory leak in Cisco IOS 15.1 through 15.4 and IOS XE 3.4.xS, 3.5.xS, 3.6.xS, and 3.7.xS before 3.7.6S; 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S; and 3.11.xS before 3.12S allows remote attackers to cause a denial of service (memory consumption or device reload) via malformed DHCPv6 packets, aka Bug ID CSCum90081. | [
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(0\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(1\\)as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(4\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7\\(5\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2017-8522 | Microsoft browsers in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8517 and CVE-2017-8524. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2017-2111 | HTTP header injection vulnerability in TS-WPTCAM firmware version 1.18 and earlier, TS-WPTCAM2 firmware version 1.00, TS-WLCE firmware version 1.18 and earlier, TS-WLC2 firmware version 1.18 and earlier, TS-WRLC firmware version 1.17 and earlier, TS-PTCAM firmware version 1.18 and earlier, TS-PTCAM/POE firmware version 1.18 and earlier may allow a remote attackers to display false information. | [
"cpe:2.3:o:iodata:ts-ptcam\\/poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-ptcam\\/poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-ptcam_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-ptcam:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wrlc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wrlc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wlc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wlc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wlce_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wlce:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wptcam2_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wptcam2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wptcam_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wptcam:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2025-1848 | zj1983 zz import_data_check server-side request forgery | A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-r94v-7v68-9rjq | Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability. | [] | null | null | 7.4 | null |
|
CVE-2006-3161 | SQL injection vulnerability in misc.php in SaphpLesson 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the action parameter. | [
"cpe:2.3:a:saphp:saphplesson:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3h63-pxm6-2x4m | Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses. | [] | null | null | 5.6 | null |
|
RHSA-2019:2980 | Red Hat Security Advisory: python security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 9.8 | null |
CVE-2022-4331 | An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.7 | null | null |
|
GHSA-fmxx-7f4h-f834 | Vulnerability in runpriv in Indigo Magic System Administration subsystem of SGI IRIX 6.3 and 6.4 allows local users to gain root privileges. | [] | null | null | null | null |
|
PYSEC-2018-135 | null | Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999. | [] | null | null | 6.5 | null |
PYSEC-2021-564 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. We have patched the issue in GitHub commit 0f931751fb20f565c4e94aa6df58d54a003cdb30. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [] | null | null | null | null |
CVE-2018-11527 | An issue was discovered in CScms v4.1. A Cross-site request forgery (CSRF) vulnerability in plugins/sys/admin/Sys.php allows remote attackers to change the administrator's username and password via /admin.php/sys/editpass_save. | [
"cpe:2.3:a:cscms_project:cscms:4.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-r33j-vf7v-cq2v | In the Linux kernel, the following vulnerability has been resolved:net: phy: micrel: Allow probing without .driver_dataCurrently, if the .probe element is present in the phy_driver structure
and the .driver_data is not, a NULL pointer dereference happens.Allow passing .probe without .driver_data by inserting NULL checks
for priv->type. | [] | null | 5.5 | null | null |
|
CVE-2024-34171 | Fuji Electric Monitouch V-SFT Stack-Based Buffer Overflow | Fuji Electric Monitouch V-SFT
is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. | [
"cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*"
] | 8.5 | 7.8 | null | null |
GHSA-mvc4-c2h4-573v | Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script | [] | null | 7.5 | null | null |
|
CVE-2024-3552 | Web Directory Free < 1.7.0 - Unauthenticated SQL Injection | The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based. | [
"cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
GHSA-2x9m-ghpm-wjh6 | A CWE-863: Incorrect Authorization vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause bypass of authentication when overwriting memory using a debugger. | [] | null | null | null | null |
|
CVE-2022-39035 | Smart eVision - Stored XSS | Smart eVision has insufficient filtering for special characters in the POST Data parameter in the specific function. An unauthenticated remote attacker can inject JavaScript to perform XSS (Stored Cross-Site Scripting) attack. | [
"cpe:2.3:a:lcnet:smart_evision:2022.02.21:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2024-21057 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:mysql:mysql:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
CVE-2019-16318 | In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2025-21689 | USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() | In the Linux kernel, the following vulnerability has been resolved:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
This patch addresses a null-ptr-deref in qt2_process_read_urb() due to
an incorrect bounds check in the following:
if (newport > serial->num_ports) {
dev_err(&port->dev,
"%s - port change to invalid port: %i\n",
__func__, newport);
break;
}
The condition doesn't account for the valid range of the serial->port
buffer, which is from 0 to serial->num_ports - 1. When newport is equal
to serial->num_ports, the assignment of "port" in the
following code is out-of-bounds and NULL:
serial_priv->current_port = newport;
port = serial->port[serial_priv->current_port];
The fix checks if newport is greater than or equal to serial->num_ports
indicating it is out-of-bounds. | [] | null | 5.5 | null | null |
GHSA-f2pr-mh68-xp6p | Out-of-bounds write in secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to cause memory corruption. | [] | null | 6.4 | null | null |
|
GHSA-qqj2-pmc2-p5vr | In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloadingWhen unload the btnxpuart driver, its associated timer will be deleted.
If the timer happens to be modified at this moment, it leads to the
kernel call this timer even after the driver unloaded, resulting in
kernel panic.
Use timer_shutdown_sync() instead of del_timer_sync() to prevent rearming.panic log:
Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP
Modules linked in: algif_hash algif_skcipher af_alg moal(O) mlan(O) crct10dif_ce polyval_ce polyval_generic snd_soc_imx_card snd_soc_fsl_asoc_card snd_soc_imx_audmux mxc_jpeg_encdec v4l2_jpeg snd_soc_wm8962 snd_soc_fsl_micfil snd_soc_fsl_sai flexcan snd_soc_fsl_utils ap130x rpmsg_ctrl imx_pcm_dma can_dev rpmsg_char pwm_fan fuse [last unloaded: btnxpuart]
CPU: 5 PID: 723 Comm: memtester Tainted: G O 6.6.23-lts-next-06207-g4aef2658ac28 #1
Hardware name: NXP i.MX95 19X19 board (DT)
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : 0xffff80007a2cf464
lr : call_timer_fn.isra.0+0x24/0x80
...
Call trace:
0xffff80007a2cf464
__run_timers+0x234/0x280
run_timer_softirq+0x20/0x40
__do_softirq+0x100/0x26c
____do_softirq+0x10/0x1c
call_on_irq_stack+0x24/0x4c
do_softirq_own_stack+0x1c/0x2c
irq_exit_rcu+0xc0/0xdc
el0_interrupt+0x54/0xd8
__el0_irq_handler_common+0x18/0x24
el0t_64_irq_handler+0x10/0x1c
el0t_64_irq+0x190/0x194
Code: ???????? ???????? ???????? ???????? (????????)
---[ end trace 0000000000000000 ]---
Kernel panic - not syncing: Oops: Fatal exception in interrupt
SMP: stopping secondary CPUs
Kernel Offset: disabled
CPU features: 0x0,c0000000,40028143,1000721b
Memory Limit: none
---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]--- | [] | null | 5.5 | null | null |
|
CVE-2009-4341 | SQL injection vulnerability in the No indexed Search (no_indexed_search) extension 0.2.0 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | [
"cpe:2.3:a:mischa_heissmann:no_indexed_search:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8f72-j8x6-xm9m | In the Linux kernel, the following vulnerability has been resolved:io_uring: fix memory leak of uid in files registrationWhen there are no files for __io_sqe_files_scm() to process in the
range, it'll free everything and return. However, it forgets to put uid. | [] | null | 5.5 | null | null |
|
GHSA-f45v-p8rv-75c2 | Multiple directory traversal vulnerabilities in SitePanel 2.6.1 and earlier (SitePanel2) allows remote attackers to (1) delete arbitrary files via the id parameter in a rmattach action to 5.php, or (2) read arbitrary files via the lang parameter to index.php. | [] | null | null | null | null |
|
GHSA-32c6-653x-x3pm | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/minarca prior to 4.2.2. | [] | null | 5.3 | null | null |
|
GHSA-jf4r-23vm-c78g | Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable. | [] | null | 7.2 | null | null |
|
GHSA-4qmq-73jf-8wvj | The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address. | [] | null | null | 7.5 | null |
|
CVE-2024-11562 | IrfanView CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | IrfanView CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24858. | [
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
] | null | null | 7.8 | null |
CVE-2025-1868 | Information display on multiple products from Famatech Corp | Vulnerability of unauthorized exposure of confidential information affecting Advanced IP Scanner and Advanced Port Scanner. It occurs when these applications initiate a network scan, inadvertently sending the NTLM hash of the user performing the scan. This vulnerability can be exploited by intercepting network traffic to a legitimate server or by setting up a fake server, in both local and remote scenarios. This exposure is relevant for both HTTP/HTTPS and SMB protocols. | [] | 6.9 | null | null | null |
RHSA-2019:0435 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.1 | null |
CVE-2022-31104 | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs in Wasmtime | Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime's implementation of the SIMD proposal for WebAssembly on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs were presented in the `i8x16.swizzle` and `select` WebAssembly instructions. The `select` instruction is only affected when the inputs are of `v128` type. The correspondingly affected Cranelift instructions were `swizzle` and `select`. The `swizzle` instruction lowering in Cranelift erroneously overwrote the mask input register which could corrupt a constant value, for example. This means that future uses of the same constant may see a different value than the constant itself. The `select` instruction lowering in Cranelift wasn't correctly implemented for vector types that are 128-bits wide. When the condition was 0 the wrong instruction was used to move the correct input to the output of the instruction meaning that only the low 32 bits were moved and the upper 96 bits of the result were left as whatever the register previously contained (instead of the input being moved from). The `select` instruction worked correctly if the condition was nonzero, however. This bug in Wasmtime's implementation of these instructions on x86_64 represents an incorrect implementation of the specified semantics of these instructions according to the WebAssembly specification. The impact of this is benign for hosts running WebAssembly but represents possible vulnerabilities within the execution of a guest program. For example a WebAssembly program could take unintended branches or materialize incorrect values internally which runs the risk of exposing the program itself to other related vulnerabilities which can occur from miscompilations. We have released Wasmtime 0.38.1 and cranelift-codegen (and other associated cranelift crates) 0.85.1 which contain the corrected implementations of these two instructions in Cranelift. If upgrading is not an option for you at this time, you can avoid the vulnerability by disabling the Wasm simd proposal. Additionally the bug is only present on x86_64 hosts. Other aarch64 hosts are not affected. Note that s390x hosts don't yet implement the simd proposal and are not affected. | [
"cpe:2.3:a:bytecodealliance:cranelift-codegen:*:*:*:*:*:rust:*:*",
"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*"
] | null | 4.8 | null | null |
CVE-2021-24032 | Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties. | [
"cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | 1.9 |
|
GHSA-q6gm-wm39-84ch | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabledWhen attempting to enable MQPRIO while HTB offload is already
configured, the driver currently returns `-EINVAL` and triggers a
`WARN_ON`, leading to an unnecessary call trace.Update the code to handle this case more gracefully by returning
`-EOPNOTSUPP` instead, while also providing a helpful user message. | [] | null | null | null | null |
|
GHSA-qpwx-f5jx-qhf4 | Arbitrary file upload in Service import feature in ServiceTonic Helpdesk software version < 9.0.35937 allows a malicious user to execute JSP code by uploading a zip that extracts files in relative paths. | [] | null | null | null | null |
|
CVE-2020-7331 | Unquoted service executable path in McAfee Endpoint Security (ENS) | Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. | [
"cpe:2.3:a:mcafee:endpoint_security:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | null |
GHSA-r496-h5j2-r5vw | Some implementations of rlogin allow root access if given a -froot parameter. | [] | null | null | null | null |
|
GHSA-25fm-gvgp-hcrp | IBM Lotus Quickr 8.1 before 8.1.0.2 services for Lotus Domino does not properly handle URLs that request images, which allows remote authenticated users to cause a denial of service (daemon crash) via a request to resources.nsf, aka SPR XFXF7JDBCX. | [] | null | null | null | null |
|
GHSA-23f8-vj3q-65w6 | In Xymon through 4.3.28, an XSS vulnerability exists in the csvinfo CGI script due to insufficient filtering of the db parameter. | [] | null | null | 6.1 | null |
|
CVE-2020-21606 | libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file. | [
"cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2021-36999 | There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution. | [
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-v554-w7jh-rvrh | Improper access control in KnoxService prior to SMR Aug-2024 Release 1 allows local attackers to get sensitive information. | [] | null | 5.1 | null | null |
|
GHSA-7cx3-6m66-7c5m | Tornado vulnerable to excessive logging caused by malformed multipart form data | SummaryWhen Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous.Affected versionsAll versions of Tornado prior to 6.5 are affected. The vulnerable parser is enabled by default.SolutionUpgrade to Tornado version 6.5. In the meantime, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy. | [] | null | 7.5 | null | null |
CVE-2022-3364 | No limit in length of "Fullname" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3. | [
"cpe:2.3:a:ikus-soft:rdiffweb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ikus-soft:rdiffweb:2.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:ikus-soft:rdiffweb:2.5.0:alpha2:*:*:*:*:*:*"
] | null | null | 5.3 | null |
GHSA-9w28-c8g5-whmh | An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID. | [] | null | 4.3 | null | null |
|
CVE-2023-5563 | The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception. | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
CVE-2020-29043 | An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name. | [
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2009-1760 | Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge Torrent, and other applications, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) and partial relative pathname in a Multiple File Mode list element in a .torrent file. | [
"cpe:2.3:a:rasterbar_software:libtorrent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rasterbar_software:libtorrent:0:*:*:*:*:*:*:*",
"cpe:2.3:a:rasterbar_software:libtorrent:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rasterbar_software:libtorrent:0.12.1:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-mx3f-824w-q245 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D. | [] | null | null | null | null |
|
CVE-2022-41054 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2011-3145 | mount.ecrpytfs_private sets group owner of /etc/mtab to user's primary group | When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private. | [
"cpe:2.3:a:mount.ecrpytfs_private_project:mount.ecrpytfs_private:-:*:*:*:*:*:*:*"
] | null | null | 3.8 | null |
GHSA-6vmj-9xjc-fxmr | Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter. | [] | null | 8.4 | null | null |
|
GHSA-6q7m-4m7c-x25p | Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read. | [] | null | null | null | null |
|
GHSA-6gvj-8vc5-8v3j | org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability | ImpactIt's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect.PatchesThe issue has now been patched against all patterns that we know about for performing redirect. It also performs a real URI parsing that should protect in most cases. This has been patched in XWiki 14.10.4 and 15.0.WorkaroundsThe only workaround is to upgrade XWiki.ReferencesJIRA ticket: https://jira.xwiki.org/browse/XWIKI-20096JIRA ticket about the improvment actually fixing the vulnerability: https://jira.xwiki.org/browse/XWIKI-20549Previous advisory about open redirect: https://github.com/advisories/GHSA-jp55-vvmf-63mvFor more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])AttributionThanks to Paulos Mesfin who originally reported the vulnerability. | [] | null | 4.7 | null | null |
RHSA-2022:2201 | Red Hat Security Advisory: rsync security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.2 | null | null |
GHSA-32gr-4cq6-5w5q | rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters | ImpactWhen the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code.Users who access the deliberately constructed URL are affected.PatchesThis vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version.WorkaroundsNo. | [] | null | 6.1 | null | null |
CVE-2018-6188 | django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. | [
"cpe:2.3:a:djangoproject:django:1.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-4q6w-gxhv-h434 | In the Linux kernel, the following vulnerability has been resolved:netfilter: nftables: Fix a memleak from userdata error path in new objectsRelease object name if userdata allocation fails. | [] | null | 5.5 | null | null |
|
CVE-2019-5184 | An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. | [
"cpe:2.3:o:wago:pfc200_firmware:03.02.02\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2023:4991 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | GitPython: Insecure non-multi options in clone and clone_from is not blocked | [
"cpe:/a:redhat:ansible_automation_platform:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9"
] | null | 9.8 | null | null |
CVE-2006-1200 | Direct static code injection vulnerability in add_link.txt in daverave Link Bank allows remote attackers to execute arbitrary PHP code via the url_name parameter, which is not sanitized before being stored in links.txt, which is later used in an include statement. | [
"cpe:2.3:a:daverave:link_bank:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
ICSA-24-345-05 | Horner Automation Cscape | The affected product contains a memory corruption vulnerability, which could allow an attacker to disclose information and execute arbitrary code. The vulnerability occurs in the parsing of CSP files. The issues result from the lack of proper validation of user-supplied data, which could allow reading past the end of allocated data structures, resulting in execution of arbitrary code. | [] | null | 7.5 | null | null |
GHSA-6p5r-8gvj-7h94 | Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). Supported versions that are affected are 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0 and 12.2.1.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 3.1 | null |
|
CVE-2024-55958 | Northern.tech CFEngine Enterprise Mission Portal 3.24.0, 3.21.5, and below allows XSS. The fixed versions are 3.24.1 and 3.21.6. | [] | null | 4.8 | null | null |
|
GHSA-9323-82qh-98r9 | Spotfire Web Player Engine in TIBCO Spotfire Web Player 6.0.x before 6.0.2 and 6.5.x before 6.5.2, Spotfire Deployment Kit 6.0.x before 6.0.2 and 6.5.x before 6.5.2, and Silver Fabric Enabler for Spotfire Web Player before 1.6.1 allows remote authenticated users to obtain sensitive information via unspecified vectors. | [] | null | null | null | null |
|
GHSA-vg4r-rg5m-fvpf | Discuz! 4.0 rc4 does not properly restrict types of files that are uploaded to the server, which allows remote attackers to execute arbitrary commands via a filename containing ".php.rar" or other multiple extensions that include .php. | [] | null | null | null | null |
|
CVE-2002-1976 | ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap. | [
"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-pcmv-x4fx-jc3f | An issue was discovered in OverIT Geocall 6.3 before build 2:346977. Weak authentication and session management allows an authenticated user to obtain access to the Administrative control panel and execute administrative functions. | [] | null | null | 8.8 | null |
|
PYSEC-2021-401 | null | TensorFlow is an open source platform for machine learning. In affected versions the implementations for convolution operators trigger a division by 0 if passed empty filter tensor arguments. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [] | null | null | null | null |
CVE-2022-2603 | Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-q292-fcwh-4fmh | JetBrains ToolBox before version 1.18 is vulnerable to a Denial of Service attack via a browser protocol handler. | [] | null | null | null | null |
|
GHSA-m6v2-gf27-8mj8 | The Motor (aka com.magzter.motorhwpublishing) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.