id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-vj2j-g82w-f3rg | DedeCMS 5.7 SP2 allows XSS via the /member/uploads_select.php f or keyword parameter. | []
| null | null | 6.1 | null |
|
CVE-2019-12491 | OnApp before 5.0.0-88, 5.5.0-93, and 6.0.0-196 allows an attacker to run arbitrary commands with root privileges on servers managed by OnApp for XEN/KVM hypervisors. To exploit the vulnerability an attacker has to have control of a single server on a given cloud (e.g. by renting one). From the source server, the attacker can craft any command and trigger the OnApp platform to execute that command with root privileges on a target server. | [
"cpe:2.3:a:onapp:onapp:5.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.0.0:update_79:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.0.0:update_82:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.0.0:update_83:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.0.0:update_87:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.1.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.3.0:update_41:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_66:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_70:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_72:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_76:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_82:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.4.0:update_84:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_50:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_59:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_65:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_75:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_80:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_83:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_87:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_90:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.5.0:update_92:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.6.0:update_83:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:5.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_122:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_152:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_159:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_62:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_80:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0:update_98:*:*:*:*:*:*",
"cpe:2.3:a:onapp:onapp:6.0.0:-:*:*:*:*:*:*"
]
| null | null | 6.6 | 8.5 |
|
GHSA-8rj5-wwmx-vj53 | Boa 0.94.13 allows remote attackers to obtain sensitive information via a misconfiguration involving backup.html, preview.html, js/log.js, log.html, email.html, online-users.html, and config.js. | []
| null | 7.5 | null | null |
|
GHSA-822f-jfpg-hg7h | Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user's site membership assignment UI. | []
| null | 4.3 | null | null |
|
GHSA-grfr-78m7-q35q | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST. | []
| null | 9.8 | null | null |
|
RHSA-2025:0329 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.16 | dompurify: nesting-based mutation XSS vulnerability | [
"cpe:/a:redhat:logging:5.8::el9"
]
| null | 8 | null | null |
RHSA-2021:3366 | Red Hat Security Advisory: python3 security update | python: CRLF injection via HTTP request method in httplib/http.client | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
]
| null | 6.5 | null | null |
GHSA-q62j-4q9v-xgm7 | A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079. | []
| null | 5.7 | null | null |
|
CVE-2024-44029 | WordPress Viala theme <= 1.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in David Garlitz viala allows Reflected XSS.This issue affects viala: from n/a through 1.3.1. | []
| null | 7.1 | null | null |
CVE-2024-22099 | NULL pointer deference in rfcomm_check_security in Linux kernel | NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.
This issue affects Linux kernel: v2.6.12-rc2. | [
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
CVE-2023-42283 | Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query. | [
"cpe:2.3:a:tyk:tyk:5.0.3:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-xq7p-w257-hcj2 | BisonFTP Server 4 release 2 allows remote attackers to cause a denial of service (CPU consumption) via a long (1) ls or (2) cwd command. | []
| null | null | null | null |
|
GHSA-vf2q-5gq8-fggp | The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900. | []
| null | null | 6.5 | null |
|
GHSA-5w9g-9xc2-mxwq | SQL injection vulnerability in feedwordpresssyndicationpage.class.php in the FeedWordPress plugin before 2015.0514 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the link_ids[] parameter in an Update action in the syndication.php page to wp-admin/admin.php. | []
| null | null | null | null |
|
GHSA-gc43-r6hx-q44q | Cross-site scripting (XSS) vulnerability in filename.asp in ASP Site Search SearchSimon Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter. | []
| null | null | null | null |
|
CVE-2023-23192 | IS Decisions UserLock MFA 11.01 is vulnerable to authentication bypass using scheduled task. | [
"cpe:2.3:a:isdecisions:userlock:11.0.1:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-fj7f-6x8x-hmmf | Memory corruption while reading the FW response from the shared queue. | []
| null | 7.8 | null | null |
|
ICSA-21-217-01 | HCC Embedded InterNiche TCP/IP stack, NicheLite (Update B) | When parsing DNS domain names, there are no checks on whether a domain name compression pointer is pointing within the bounds of the packet, which may result in an out-of-bounds read.CVE-2020-25767 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The routine for parsing DNS response packets does not check the response data length field of individual DNS answers, which may cause an out-of-bounds read/write.CVE-2020-25928 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The number of queries or responses specified in the DNS packet header is not validated with the query/response data available in the DNS packet, leading to an out-of-bounds read.CVE-2020-25927 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The DNS client does not sufficiently randomize transaction IDs, facilitating DNS cache poisoning attacks.CVE-2020-25926 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N). The code that parses ICMP packets relies on an unchecked value of the IP payload size to compute the ICMP checksum, which may result in an out-of-bounds read.CVE-2020-35683 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The code that parses TCP packets relies on an unchecked value of the IP payload size to compute the length of the TCP payload within the TCP checksum computation function, which may result in an out-of-bounds read.CVE-2020-35684 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). TCP ISNs are insufficiently randomized, which may result in TCP spoofing by an attacker.CVE-2020-35685 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). The TCP urgent data processing function may invoke a panic function, which may result in an infinite loop.CVE-2021-31400 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An attacker could send a specially crafted IP packet to trigger an integer overflow due to the lack of IP length validation.CVE-2021-31401 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). A potential heap buffer overflow exists in the code that parses the HTTP POST request due to lack of size validation.CVE-2021-31226 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). A potential heap buffer overflow exists in the code that parses the HTTP POST request due to an incorrect signed integer comparison.CVE-2021-31227 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An attacker may be able to predict DNS queries ' source port to then send forged DNS response packets, which may be accepted as valid answers.CVE-2021-31228 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N). Unhandled HTTP requests result in an infinite loop that disrupts TCP/IP communication.CVE-2021-27565 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). The TFTP packet processing function does not ensure that the filename is null-terminated, which may result in a denial-of-service condition.CVE-2021-36762 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). | []
| null | null | 7.5 | null |
ICSA-18-270-03 | Fuji Electric FRENIC Devices (Update A) | A buffer over-read vulnerability may allow remote code execution on the device.CVE-2018-14790 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The program does not properly parse FNC files that may allow for information disclosure.CVE-2018-14798 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The program does not properly check user-supplied comments which may allow for arbitrary remote code execution.CVE-2018-14802 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | []
| null | null | 9.8 | null |
GHSA-6j29-ph9w-5qxr | HP System Management Homepage (SMH) before 7.1.1 does not properly validate input, which allows remote authenticated users to have an unspecified impact via unknown vectors. | []
| null | null | null | null |
|
CVE-2018-6300 | Remote password change in Hanwha Techwin Smartcams | [
"cpe:2.3:o:hanwha-security:snh-v6410pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwha-security:snh-v6410pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwha-security:snh-v6410pnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwha-security:snh-v6410pnw:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
GHSA-mw9j-9gfx-vcp8 | ATutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Social Application component resulting in privilege escalation. ATutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Module component resulting in privilege escalation. ATutor versions 2.2.1 and earlier are vulnerable to a incorrect access control check vulnerability in the Alternative Content component resulting in privilege escalation. | []
| null | null | 9.8 | null |
|
CVE-2021-47366 | afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server | In the Linux kernel, the following vulnerability has been resolved:
afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server
AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and
Linux's afs client switches between them when talking to a non-YFS server
if the read size, the file position or the sum of the two have the upper 32
bits set of the 64-bit value.
This is a problem, however, since the file position and length fields of
FS.FetchData are *signed* 32-bit values.
Fix this by capturing the capability bits obtained from the fileserver when
it's sent an FS.GetCapabilities RPC, rather than just discarding them, and
then picking out the VICED_CAPABILITY_64BITFILES flag. This can then be
used to decide whether to use FS.FetchData or FS.FetchData64 - and also
FS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to
switch on the parameter values.
This capabilities flag could also be used to limit the maximum size of the
file, but all servers must be checked for that.
Note that the issue does not exist with FS.StoreData - that uses *unsigned*
32-bit values. It's also not a problem with Auristor servers as its
YFS.FetchData64 op uses unsigned 64-bit values.
This can be tested by cloning a git repo through an OpenAFS client to an
OpenAFS server and then doing "git status" on it from a Linux afs
client[1]. Provided the clone has a pack file that's in the 2G-4G range,
the git status will show errors like:
error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
This can be observed in the server's FileLog with something like the
following appearing:
Sun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001
Sun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866
...
Sun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5
Note the file position of 18446744071815340032. This is the requested file
position sign-extended. | []
| null | 5.5 | null | null |
CVE-2022-3068 | Improper Privilege Management in octoprint/octoprint | Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3. | [
"cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
CVE-2021-30559 | Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-4rc2-2xhw-8fq5 | The Bluetooth HCI interface in Apple OS X before 10.11.2 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. | []
| null | null | null | null |
|
GHSA-p7w4-2fhg-mqv6 | jabberd14 1.6.1.1 and earlier does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. | []
| null | null | null | null |
|
CVE-2024-0271 | Kashipara Food Management System addmaterial_edit.php sql injection | A vulnerability has been found in Kashipara Food Management System up to 1.0 and classified as critical. This vulnerability affects unknown code of the file addmaterial_edit.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249826 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:kashipara:food_management_system:*:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
CVE-2023-4807 | POLY1305 MAC implementation corrupts XMM registers on Windows | Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications on the
Windows 64 platform when running on newer X86_64 processors supporting the
AVX512-IFMA instructions.
Impact summary: If in an application that uses the OpenSSL library an attacker
can influence whether the POLY1305 MAC algorithm is used, the application
state might be corrupted with various application dependent consequences.
The POLY1305 MAC (message authentication code) implementation in OpenSSL does
not save the contents of non-volatile XMM registers on Windows 64 platform
when calculating the MAC of data larger than 64 bytes. Before returning to
the caller all the XMM registers are set to zero rather than restoring their
previous content. The vulnerable code is used only on newer x86_64 processors
supporting the AVX512-IFMA instructions.
The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However given the contents of the registers are just zeroized so
the attacker cannot put arbitrary values inside, the most likely consequence,
if any, would be an incorrect result of some application dependent
calculations or a crash leading to a denial of service.
The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3 and a malicious client can influence whether this AEAD
cipher is used by the server. This implies that server applications using
OpenSSL can be potentially impacted. However we are currently not aware of
any concrete application that would be affected by this issue therefore we
consider this a Low severity security issue.
As a workaround the AVX512-IFMA instructions support can be disabled at
runtime by setting the environment variable OPENSSL_ia32cap:
OPENSSL_ia32cap=:~0x200000
The FIPS provider is not affected by this issue. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2016-10762 | The CampTix Event Ticketing plugin before 1.5 for WordPress allows CSV injection when the export tool is used. | [
"cpe:2.3:a:automattic:camptix_event_ticketing:*:*:*:*:*:wordpress:*:*"
]
| null | null | 7.5 | 5.1 |
|
CVE-2014-2893 | The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:llvm:clang:*:*:*:*:*:*:*:*"
]
| null | null | null | 1.9 |
|
GHSA-v85h-m5h5-mqgp | Buffer overflow in NetScreen-Remote 8.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) large number of payloads, or (3) a long payload. | []
| null | null | null | null |
|
CVE-2010-3989 | Cross-site request forgery (CSRF) vulnerability in HP Insight Control Virtual Machine Management before 6.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:hp:insight_control_virtual_machine_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_virtual_machine_management:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_virtual_machine_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_virtual_machine_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_virtual_machine_management:6.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2007-1517 | SQL injection vulnerability in comments.php in WSN Guest 1.02 and 1.21 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:paul_knierim:wsn_guest:1.21:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-g2pq-36f3-2p66 | The server component of TIBCO Software Inc.'s TIBCO Enterprise Runtime for R - Server Edition, and TIBCO Spotfire Analytics Platform for AWS Marketplace contains a vulnerability that theoretically allows an unauthenticated user to bypass access controls and remotely execute code using the operating system account hosting the affected component. This issue affects: TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below, and TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and 10.5.0. | []
| null | null | null | null |
|
GHSA-m5xh-w97f-qrvv | Improper input validation vulnerability in Galaxy Store prior to version 4.5.49.8 allows local attackers to execute JavaScript by launching a web page. | []
| null | 6.1 | null | null |
|
GHSA-qrhw-r9hg-cwcm | Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter. | []
| null | 9.8 | null | null |
|
CVE-2023-28273 | Windows Clip Service Elevation of Privilege Vulnerability | Windows Clip Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]
| null | 7 | null | null |
CVE-2017-8044 | In Pivotal Single Sign-On for PCF (1.3.x versions prior to 1.3.4 and 1.4.x versions prior to 1.4.3), certain pages allow code to be injected into the DOM environment through query parameters, leading to XSS attacks. | [
"cpe:2.3:a:vmware:single_sign-on_for_pivotal_cloud_foundry:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:single_sign-on_for_pivotal_cloud_foundry:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:single_sign-on_for_pivotal_cloud_foundry:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:single_sign-on_for_pivotal_cloud_foundry:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:single_sign-on_for_pivotal_cloud_foundry:1.4.2:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2019-8569 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to execute arbitrary code with system privileges. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | 7.2 |
|
CVE-2021-28099 | In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. | [
"cpe:2.3:a:netflix:hollow:-:*:*:*:*:*:*:*"
]
| null | 4.4 | null | 3.6 |
|
GHSA-xqxc-x6p3-w683 | Deno run with --allow-read and --deny-read flags results in allowed | Summary`deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. Same with all global unary permissions given as `--allow-* --deny-*`.DetailsCaused by the fast exit logic in #22894.PoCRun the above command expecting no permissions to be passed.ImpactThis only affects a nonsensical combination of flags, so there shouldn't be a real impact on the userbase. | []
| 5.5 | 5.3 | null | null |
CVE-2023-37977 | WordPress WPFunnels Plugin <= 2.7.16 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPFunnels Team Drag & Drop Sales Funnel Builder for WordPress – WPFunnels plugin <= 2.7.16 versions. | [
"cpe:2.3:a:coderex:wpfunnels:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
CVE-2023-20991 | In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc , there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
CVE-2002-0860 | The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file. | [
"cpe:2.3:a:microsoft:office_web_components:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_components:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-29175 | An improper certificate validation vulnerability [CWE-295] in FortiOS 6.2 all versions, 6.4 all versions, 7.0.0 through 7.0.10, 7.2.0 and FortiProxy 1.2 all versions, 2.0 all versions, 7.0.0 through 7.0.9, 7.2.0 through 7.2.3 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remote FortiGuard's map server. | [
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
CVE-2017-12548 | A local arbitrary command execution vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 5.6 | 5.5 |
|
CVE-2009-1325 | Stack-based buffer overflow in Mini-stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file. | [
"cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2013-4511 | Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.9 |
|
GHSA-6m27-6q98-ch54 | Rejected reason: Not used | []
| null | null | null | null |
|
GHSA-hhf6-pg6q-xrxg | Cross-site scripting (XSS) vulnerability in vacation/1_mobile/alert_members.php in MYRE Vacation Rental Software allows remote attackers to inject arbitrary web script or HTML via the link_idd parameter in a login action. | []
| null | null | null | null |
|
CVE-2022-47465 | In vdsp service, there is a missing permission check. This could lead to local denial of service in vdsp service. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-pw4c-h493-rxm2 | The vulnerability is to theft of arbitrary files with system privilege in the Screen recording ("com.lge.gametools.gamerecorder") app in the "com/lge/gametools/gamerecorder/settings/ProfilePreferenceFragment.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The Screen recording app saves contents of arbitrary URIs to SD card which is a world-readable storage. | []
| null | 6.1 | null | null |
|
GHSA-wjwq-gx2g-vrjg | In the Linux kernel, the following vulnerability has been resolved:netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()nf_osf_find() incorrectly returns true on mismatch, this leads to
copying uninitialized memory area in nft_osf which can be used to leak
stale kernel stack data to userspace. | []
| null | 5.5 | null | null |
|
GHSA-6c7f-4xgm-82xq | Buffer overflow in elogd.c in elog before 2.5.7 r1558-4 allows attackers to execute code via unspecified variables, when writing to the log file. | []
| null | null | null | null |
|
GHSA-xwj2-rcwr-xpcp | PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22286. | []
| null | null | 3.3 | null |
|
CVE-2018-20234 | There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. | [
"cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*"
]
| null | null | 8.8 | 9 |
|
GHSA-g38j-89cg-fgfg | Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code. | []
| null | null | null | null |
|
GHSA-w496-4p5w-36v4 | SQL injection vulnerability in index.php in AJ Shopping Cart 1.0 allows remote attackers to execute arbitrary SQL commands via the maincatid parameter in a showmaincatlanding action. | []
| null | null | null | null |
|
GHSA-79m9-fj96-r8q8 | Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit. | []
| null | null | null | null |
|
GHSA-4rvq-6825-fp99 | Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS. | []
| null | 6.8 | null | null |
|
CVE-2025-3257 | xujiangfei admintwo updateSet cross-site request forgery | A vulnerability classified as problematic has been found in xujiangfei admintwo 1.0. This affects an unknown part of the file /user/updateSet. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 4.3 | 4.3 | 5 |
CVE-2019-11596 | In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | [
"cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2023-48709 | iTop vulnerable to potential formula injection in Excel/CSV export file | iTop is an IT service management platform. When exporting data from backoffice or portal in CSV or Excel files, users' inputs may include malicious formulas that may be imported into Excel. As Excel 2016 does **not** prevent Remote Code Execution by default, uninformed users may become victims. This vulnerability is fixed in 2.7.9, 3.0.4, 3.1.1, and 3.2.0. | [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
CVE-2009-0382 | Unspecified vulnerability in Internationalization (i18n) Translation 5.x before 5.x-2.5, a module for Drupal, allows remote attackers with "translate node" permissions to bypass intended access restrictions and read unpublished nodes via unspecified vectors. | [
"cpe:2.3:a:drupal:internationalization:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:internationalization:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-m9g7-gvwq-v3g8 | User-controlled inputs are improperly escaped in:VotePage.php (poll option input)ResultPage::getPagesTab() and getErrorsTab() (user-controllable page names)This allows attackers to inject JavaScript and compromise user sessions under certain conditions.This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2. | []
| null | 9.8 | null | null |
|
CVE-2019-10339 | A missing permission check in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed users with Overall/Read access to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials. | [
"cpe:2.3:a:jenkins:jx_resources:*:*:*:*:*:jenkins:*:*"
]
| null | 8.8 | null | 4 |
|
GHSA-vrfg-qj9f-9v7r | An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOKit" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors. | []
| null | null | 3.3 | null |
|
CVE-1999-1475 | ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command. | [
"cpe:2.3:a:proftpd_project:proftpd:1.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
CVE-2022-0594 | Shareaholic < 9.7.6 - Information Disclosure | The Professional Social Sharing Buttons, Icons & Related Posts WordPress plugin before 9.7.6 does not have proper authorisation check in one of the AJAX action, available to unauthenticated (in v < 9.7.5) and author+ (in v9.7.5) users, allowing them to call it and retrieve various information such as the list of active plugins, various version like PHP, cURL, WP etc. | [
"cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:*"
]
| null | 5.3 | null | null |
GHSA-62c8-7p5q-m59c | The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the editor_html() function in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to view password protected and draft posts. | []
| null | 5.3 | null | null |
|
GHSA-8mgc-hp6q-8pj5 | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix optc2_configure warning on dcn314[Why]
dcn314 uses optc2_configure_crc() that wraps
optc1_configure_crc() + set additional registers
not applicable to dcn314.
It's not critical but when used leads to warning like:
WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_helper.c
Call Trace:
<TASK>
generic_reg_set_ex+0x6d/0xe0 [amdgpu]
optc2_configure_crc+0x60/0x80 [amdgpu]
dc_stream_configure_crc+0x129/0x150 [amdgpu]
amdgpu_dm_crtc_configure_crc_source+0x5d/0xe0 [amdgpu][How]
Use optc1_configure_crc() directly | []
| null | null | null | null |
|
CVE-2024-37441 | WordPress NewsMash theme <= 1.0.34 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in DesertThemes NewsMash allows Cross Site Request Forgery.This issue affects NewsMash: from n/a through 1.0.34. | []
| null | 4.3 | null | null |
GHSA-854h-gmvf-x57p | com.novell.zenworks.inventory.rtr.actionclasses.wcreports in Novell ZENworks Configuration Management (ZCM) allows remote attackers to read arbitrary folders via the dirname variable. | []
| null | null | 7.5 | null |
|
CVE-2020-14504 | The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings. | [
"cpe:2.3:o:rockwellautomation:1734-aentr_point_i\\/o_dual_port_network_adaptor_series_b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1734-aentr_point_i\\/o_dual_port_network_adaptor_series_b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:1734-aentr_point_i\\/o_dual_port_network_adaptor_series_c_firmware:6.011:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:1734-aentr_point_i\\/o_dual_port_network_adaptor_series_c_firmware:6.012:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1734-aentr_point_i\\/o_dual_port_network_adaptor_series_c:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
GHSA-xgvv-cg7q-v678 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Baptiste Placé iCalendrier allows Stored XSS.This issue affects iCalendrier: from n/a through 1.80. | []
| null | 6.5 | null | null |
|
CVE-2024-35510 | An arbitrary file upload vulnerability in /dede/file_manage_control.php of DedeCMS v5.7.114 allows attackers to execute arbitrary code via uploading a crafted file. | [
"cpe:2.3:a:dedecms:dedecms:5.7.114:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2018-17300 | Stored XSS exists in CuppaCMS through 2018-09-03 via an administrator/#/component/table_manager/view/cu_menus section name. | [
"cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
GHSA-cgmh-xxmq-hp46 | BerriAI litellm v1.65.4 was discovered to contain a SQL injection vulnerability via the /key/block endpoint. | []
| null | 5.4 | null | null |
|
CVE-2008-6336 | Directory traversal vulnerability in download.php in Text Lines Rearrange Script 1.0, when register_globals is enabled, allows remote attackers to read arbitrary local files via directory traversal sequences in the filename parameter. | [
"cpe:2.3:a:rightscripts:text_lines_rearrange_script:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-x8w8-g4xf-jwpw | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in aytechnet DyaPress ERP/CRM allows PHP Local File Inclusion. This issue affects DyaPress ERP/CRM: from n/a through 18.0.2.0. | []
| null | 8.1 | null | null |
|
GHSA-9mh8-9j64-443f | HashiCorp Vault's revocation list not respected | HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10. | []
| null | 5.3 | null | null |
GHSA-f63f-f9wj-5wjg | Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p22, <2.2.0p37, <2.1.0p50 (EOL) causes remote site secrets to be written to web log files accessible to local site users. | []
| 5.7 | 5.5 | null | null |
|
CVE-2007-10002 | web-cyradm auth.inc.php sql injection | A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php. The manipulation of the argument login/login_password/LANG leads to sql injection. The attack may be launched remotely. The name of the patch is 2bcbead3bdb5f118bf2c38c541eaa73c29dcc90f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217640. | [
"cpe:2.3:a:web-cyradm_project:web-cyradm:*:*:*:*:*:*:*:*"
]
| null | 7.3 | 7.3 | 7.5 |
CVE-2024-30142 | HCL BigFix Compliance is affected by a missing secure flag on a cookie | HCL BigFix Compliance is affected by a missing secure flag on a cookie. If a secure flag is not set, cookies may be stolen by an attacker using XSS, resulting in unauthorized access or session cookies could be transferred over an unencrypted channel. | []
| null | 3.8 | null | null |
CVE-2024-42460 | In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero. | [
"cpe:2.3:a:elliptic_project:elliptic:6.5.6:*:*:*:*:node.js:*:*"
]
| null | 5.3 | null | null |
|
GHSA-77x6-r257-2x55 | Directory Traversal vulnerability in the administrative user interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to gain elevated privileges via unspecified vectors. | []
| null | null | 9.1 | null |
|
GHSA-28mj-jg9q-pj9c | Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability." | []
| null | null | null | null |
|
CVE-2024-27661 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain Null-pointer dereferences in sub_4484A8(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [
"cpe:2.3:o:dlink:dir-823_firmware:1.0.2b05_20181207:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
GHSA-mqjq-mq5f-5r6f | The Responsive Flickr Slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fshow' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
GHSA-65m9-m259-7jqw | Improper Authorization in react-oauth-flow | All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available. | []
| null | null | null | null |
GHSA-ph56-52p3-8fjx | An issue was discovered in MyBiz MyProcureNet 5.0.0. A malicious file can be uploaded to the webserver by an attacker. It is possible for an attacker to upload a script to issue operating system commands. This vulnerability occurs because an attacker is able to adjust the "HiddenFieldControlCustomWhiteListedExtensions" parameter and add arbitrary extensions to the whitelist during the upload. For instance, if the extension .asp is added to the "HiddenFieldControlCustomWhiteListedExtensions" parameter, the server accepts "secctest.asp" as a legitimate file. Hence malicious files can be uploaded in order to execute arbitrary commands to take over the server. | []
| null | null | 9.9 | null |
|
CVE-2022-23606 | Crash when a cluster is deleted in Envoy | Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade. | [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
GHSA-v774-w7w7-mvrg | SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id. | []
| null | null | null | null |
|
RHSA-2019:1116 | Red Hat Security Advisory: redhat-virtualization-host security update | edk2: Buffer Overflow in BlockIo service for RAM disk | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
]
| null | null | 8.3 | null |
CVE-2023-45769 | WordPress WP Report Post Plugin <= 2.1.2 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alex Raven WP Report Post plugin <= 2.1.2 versions. | [
"cpe:2.3:a:alexraven:wp_report_post:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
GHSA-cjpq-j9jr-vg53 | The Print-O-Matic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'print-me' shortcode in all versions up to, and including, 2.1.10 due to insufficient input sanitization and output escaping on user supplied attributes such as 'tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2006-5916 | Intego VirusBarrier X4 allows context-dependent attackers to bypass virus protection by quickly injecting many infected files into the filesystem, which prevents VirusBarrier from processing all the files. | [
"cpe:2.3:a:intego:virusbarrier:x4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2005-0612 | Cisco IP/VC Videoconferencing System 3510, 3520, 3525 and 3530 contain hard-coded default SNMP community strings, which allows remote attackers to gain access, cause a denial of service, and modify configuration. | [
"cpe:2.3:h:cisco:ipvc-3510-mcu:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3520-gw-2b:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3520-gw-2b2v:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3520-gw-2v:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3520-gw-4v:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3525-gw-1p:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ipvc-3530-vta:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-35009 | PNGDec commit 8abf6be was discovered to contain a memory allocation problem via asan_malloc_linux.cpp. | [
"cpe:2.3:a:pngdec_project:pngdec:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pngdec_project:pngdec:1.0.1:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.