id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-2xw2-4wq8-62xx | An issue was discovered in the Purchase component of Zoho ManageEngine ServiceDesk Plus. There is XSS via the SearchN.do search field, a different vulnerability than CVE-2019-12189. | []
| null | null | null | null |
|
CVE-2024-48540 | Incorrect access control in XIAO HE Smart 4.3.1 allows attackers to access sensitive information by analyzing the code and data within the APK file. | [
"cpe:2.3:o:shenzhen_xiaohe_lejia_technology_co:xiaohesmart_firmware:4.3.1:*:*:*:*:*:*:*"
]
| null | 6.2 | null | null |
|
CVE-2023-28774 | WordPress Review Stream Plugin <= 1.6.5 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Grade Us, Inc. Review Stream plugin <= 1.6.5 versions. | [
"cpe:2.3:a:grade:review_stream:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
CVE-2009-4581 | Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter. | [
"cpe:2.3:a:roseonlinecms:roseonlinecms:*:b1:*:*:*:*:*:*"
]
| null | 9.8 | null | 6.8 |
|
GHSA-f3mf-g3hh-m9vw | An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control. Access to the internal wiki is permitted when an external wiki service is enabled. | []
| null | null | null | null |
|
RHSA-2020:0669 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server | [
"cpe:/o:redhat:rhel_eus:7.6::server"
]
| null | 6 | null | null |
GHSA-x92f-4627-r8gg | An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265. | []
| null | 5.5 | null | null |
|
GHSA-r88v-v565-mg8r | Stack overflow risk when vector images are parsed during file preview
Impact: Successful exploitation of this vulnerability may affect the file preview function. | []
| null | 4 | null | null |
|
CVE-2020-13327 | An issue has been discovered in GitLab Runner affecting all versions starting from 13.4.0 before 13.4.2, all versions starting from 13.3.0 before 13.3.7, all versions starting from 13.2.0 before 13.2.10. Insecure Runner Configuration in Kubernetes Environments | [
"cpe:2.3:a:gitlab:runner:*:*:*:*:*:*:*:*"
]
| null | 6 | null | null |
|
CVE-2023-30989 | IBM i privilege escalation | IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain all object access to the host operating system. IBM X-Force ID: 254017. | [
"cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
CVE-2021-25133 | The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function. | [
"cpe:2.3:o:hpe:cloudline_cl3100_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl3100_gen10_server_firmware:1.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl4100_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl4100_gen10_server_firmware:1.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5200_gen9_server_firmware:1.07.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5800_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5800_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5800_gen9_server_firmware:1.09.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
GHSA-6v6w-h8m6-7mv2 | Apache Airflow: DAG Code and Import Error Permissions Ignored | Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated users to view DAG code and import errors of DAGs they do not have permission to view through the API and the UI.Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability | []
| 5.1 | null | null | null |
GHSA-83h2-mm3x-cpw4 | Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php. | []
| null | 6.1 | null | null |
|
CVE-2012-4397 | Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) calendar displayname to part.choosecalendar.rowfields.php or (2) part.choosecalendar.rowfields.shared.php in apps/calendar/templates/; or (3) unspecified vectors to apps/contacts/lib/vcard.php. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2019-2721 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 4.6 |
|
CVE-2025-52919 | In Yealink RPS before 2025-05-26, the certificate upload function does not properly validate certificate content, potentially allowing invalid certificates to be uploaded. | []
| null | 4.3 | null | null |
|
GHSA-qfq8-mv2q-hvwp | A reflected cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition enables attackers to execute malicious JavaScript code in the context of an authenticated Expedition user’s browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to Expedition browser-session theft. | []
| 7 | null | null | null |
|
GHSA-cpq6-cgjp-6336 | An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the User Account Mangemnt component in the authentication mechanism. | []
| null | 9.8 | null | null |
|
GHSA-crgq-9rfx-9v2m | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | []
| null | null | null | null |
|
CVE-2021-44695 | Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device. | [
"cpe:2.3:o:siemens:simatic_s7-plcsim_advanced_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-plcsim_advanced:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1211c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1211c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1212c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1212c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1212fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1212fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1214c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1214c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1214fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1214fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1215c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1215c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1215fc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1215fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1217c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1217c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1507s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1507s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1507s_f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1507s_f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1508s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1508s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1508s_f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1508s_f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511f-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511f-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511t-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511t-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511tf-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511tf-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512sp-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512sp-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512spf-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512spf-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513f-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513f-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513r-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513r-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_151511c-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_151511c-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_151511f-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_151511f-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515f-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515f-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515f-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515f-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515r-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515r-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515t-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515t-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515tf-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515tf-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516f-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516f-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516pro-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516pro-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516pro_f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516pro_f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516t-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516t-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516tf-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516tf-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517f-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517f-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517tf-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517tf-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518hf-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518hf-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518t-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518t-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518tf-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518tf-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_15pro-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_15pro-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_15prof-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_15prof-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_cpu_1513pro-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_cpu_1513pro-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_cpu_1513prof-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_cpu_1513prof-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200_sp_open_controller_cpu_1515sp_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200_sp_open_controller_cpu_1515sp_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_software_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_software_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-300_cpu_314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-300_cpu_314:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-300_cpu_315-2_dp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-300_cpu_315-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-300_cpu_315-2_pn\\/dp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-300_cpu_315-2_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-300_cpu_317-2_pn\\/dp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-300_cpu_317-2_pn\\/dp:v6:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_tim_1531_irc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_tim_1531_irc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:tim_1531_irc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
CVE-2015-0019 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-7xwr-85xj-7jqw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PressTigers Simple Owl Carousel allows DOM-Based XSS. This issue affects Simple Owl Carousel: from n/a through 1.1.1. | []
| null | 6.5 | null | null |
|
GHSA-c6m5-fcv9-26fc | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8164. | []
| null | 7.8 | null | null |
|
GHSA-42mm-766g-hj5r | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. | []
| null | null | 6.5 | null |
|
GHSA-8w7p-q234-6qwj | Dameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating CltDHPubKeyLen during key negotiation, which could crash the application or leak sensitive information. | []
| null | null | null | null |
|
CVE-2024-3092 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. A payload may lead to a Stored XSS while using the diff viewer, allowing attackers to perform arbitrary actions on behalf of victims. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
]
| null | 8.7 | null | null |
GHSA-33f9-4h6q-m86q | An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSOAR before 7.2.1 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP GET requests. | []
| null | 7.2 | null | null |
|
CVE-2017-18793 | NETGEAR R7800 devices before 1.0.2.36 are affected by command injection. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
]
| null | null | 6.7 | null |
|
CVE-2023-24187 | An XML External Entity (XXE) vulnerability in ureport v2.2.9 allows attackers to execute arbitrary code via uploading a crafted XML file to /ureport/designer/saveReportFile. | [
"cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-x8qh-xq3w-x7fx | Cross Site Scripting vulnerability in Faculty Evaulation System using PHP/MySQLi v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the page parameter. | []
| null | 5.4 | null | null |
|
GHSA-ccj2-xhg7-jrxc | The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions. | []
| null | null | null | null |
|
CVE-2025-0483 | Fanli2012 native-php-cms jump.php cross site scripting | A vulnerability has been found in Fanli2012 native-php-cms 1.0 and classified as problematic. This vulnerability affects unknown code of the file /fladmin/jump.php. The manipulation of the argument message/error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 3.5 | 3.5 | 4 |
GHSA-36c9-hhx6-w4hh | Dell PowerScale OneFS, 8.2.x-9.5.x, contains a exposure of sensitive information to an unauthorized Actor vulnerability. An authorized local attacker could potentially exploit this vulnerability, leading to escalation of privileges. | []
| null | 7.8 | null | null |
|
CVE-2024-13555 | 1 Click WordPress Migration Plugin – 100% FREE for a limited time <= 2.1 - Cross-Site Request Forgery to Backup Process Cancellation | The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the cancel_actions() function. This makes it possible for unauthenticated attackers to cancel a triggered backup via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 5.3 | null | null |
CVE-2009-2260 | stardict 3.0.1, when Enable Net Dict is configured, sends the contents of the clipboard to a dictionary server, which allows remote attackers to obtain sensitive information by sniffing the network. | [
"cpe:2.3:a:stardict:stardict:3.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2016-8916 | IBM Tivoli Storage Manager 5.5, 6.1-6.4, and 7.1 stores password information in a log file that could be read by a local user when a set password command is issued. IBM X-Force ID: 118472. | [
"cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.500:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.600:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6.4:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
CVE-2006-0845 | Leif M. Wright's Blog 3.5 allows remote authenticated users with administrative privileges to execute arbitrary programs, including shell commands, by configuring the sendmail path to a malicious pathname. | [
"cpe:2.3:a:leif_m._wright:web_blog:3.5:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2021-44377 | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetImage param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
]
| null | null | 8.6 | null |
|
CVE-2016-8639 | It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface. | [
"cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite_capsule:6.3:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
CVE-2010-0931 | The Perforce service (p4s.exe) in Perforce Server 2008.1 allows remote attackers to cause a denial of service (daemon crash) via crafted data, possibly involving a large sndbuf value. | [
"cpe:2.3:a:perforce:perforce_server:2008.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-3vrx-27jg-h7pf | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2.Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue. | []
| null | 7.5 | null | null |
|
CVE-2016-3644 | The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via modified MIME data in a message. | [
"cpe:2.3:a:symantec:norton_security:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:symantec:protection_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:protection_engine:7.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:advanced_threat_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_bootable_removal_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.0:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.5:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_center_security_server:6.6:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:protection_for_sharepoint_servers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:message_gateway_for_service_providers:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:message_gateway_for_service_providers:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:csapi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:linux:*:*",
"cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:macos:*:*",
"cpe:2.3:a:symantec:norton_power_eraser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security_for_domino:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:message_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_360:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_security_with_backup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:ngc:*:*:*:*:*:*:*:*"
]
| null | null | 8.4 | 10 |
|
GHSA-fjwp-9m9r-9pw2 | ImageIO in Apple iOS before 9.3.3, OS X before 10.11.6, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF file. | []
| null | null | 8.8 | null |
|
GHSA-v46g-6fx7-cp78 | PAX Technology A930 PayDroid_7.1.1_Virgo_V04.5.02_20220722 allows attackers to compile a malicious shared library and use LD_PRELOAD to bypass authorization checks. | []
| null | 6.7 | null | null |
|
GHSA-vf8v-77xw-m9q6 | In llcp_util_parse_connect of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-111660010 | []
| null | null | 6.5 | null |
|
GHSA-j5m8-qv5m-qxgq | An arbitrary file upload vulnerability in the component /apiadmin/upload/attach of 74cmsSE v3.13.0 allows attackers to execute arbitrary code via a crafted PHP file. | []
| null | 9.8 | null | null |
|
GHSA-h6x8-4mx9-224h | In s::can moni::tools before version 4.2 an authenticated attacker could get full access to the database through SQL injection. This may result in loss of confidentiality, loss of integrity and DoS. | []
| null | 8.8 | null | null |
|
CVE-2023-34980 | QTS, QuTS hero | An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 4.5.4.2627 build 20231225 and later
QuTS hero h4.5.4.2626 build 20231225 and later
| [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
CVE-2024-8803 | Bulk NoIndex & NoFollow Toolkit <= 2.15 - Reflected Cross-Site Scripting | The Bulk NoIndex & NoFollow Toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:madfishdigital:bulk_noindex_\\&_nofollow_toolkit:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
GHSA-w78r-wpwh-49jc | In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the GetMagickProperty function in MagickCore/property.c. | []
| null | null | 9.8 | null |
|
GHSA-25gm-f4jj-c4jm | Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3. | []
| null | null | 6.1 | null |
|
GHSA-pm57-h436-7cgq | Carinal Tien Hospital Health Report System’s login page has improper authentication, a remote attacker can acquire another general user’s privilege by modifying the cookie parameter without authentication. The attacker can then perform limited operations on the system or modify data, making the service partially unavailable to the user. | []
| null | 7.3 | null | null |
|
CVE-2022-41973 | multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root. | [
"cpe:2.3:a:opensvc:multipath-tools:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-3xj2-xvqh-gvp5 | Elevation of privilege vulnerability in GE HealthCare EchoPAC products | []
| null | 8.4 | null | null |
|
CVE-2009-2951 | Phenotype CMS before 2.9 does not use a random salt value for password encryption, which makes it easier for context-dependent attackers to determine cleartext passwords. | [
"cpe:2.3:a:phenotype-cms:phenotype_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phenotype-cms:phenotype_cms:2.7:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-6232 | SAP Commerce, versions 1811, 1905, does not perform necessary authorization checks for an anonymous user, due to Missing Authorization Check. This affects confidentiality of secure media. | [
"cpe:2.3:a:sap:commerce_cloud:1811:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:1905:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
|
CVE-2015-4257 | Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence MCU 4500 devices with software 4.5(1.55) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90710. | [
"cpe:2.3:a:cisco:telepresence_mcu_software:4.5\\(1.55\\):*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-5556-q3wj-f3qc | Denial of service due to improper handling of malformed input. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40077. | []
| null | null | 7.5 | null |
|
CVE-2021-21549 | Dell EMC XtremIO Versions prior to 6.3.3-8, contain a Cross-Site Request Forgery Vulnerability in XMS. A non-privileged attacker could potentially exploit this vulnerability, leading to a privileged victim application user being tricked into sending state-changing requests to the vulnerable application, causing unintended server operations. | [
"cpe:2.3:a:dell:xtremio_management_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xtremio_x1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xtremio_x2:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-7p78-g262-f9rp | LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3. | []
| null | 8.8 | null | null |
|
GHSA-wj6v-2jfm-gw75 | In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference. | []
| null | null | 9.8 | null |
|
GHSA-4qxp-c58r-4xg9 | A tampering vulnerability in the CylanceOPTICS Windows Installer Package of CylanceOPTICS for Windows version 3.2 and 3.3 could allow an attacker to potentially uninstall CylanceOPTICS from a system thereby leaving it with only the protection of CylancePROTECT. | []
| 7.1 | null | null | null |
|
CVE-2023-1393 | A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. | [
"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-xmx9-rjwq-m2x6 | Pixie 1.0.4 allows an admin/index.php s=publish&m=static&x= XSS attack. | []
| null | null | 6.1 | null |
|
CVE-2006-4290 | Directory traversal vulnerability in Sony VAIO Media Server 2.x, 3.x, 4.x, and 5.x before 20060626 allows remote attackers to gain sensitive information via unspecified vectors. | [
"cpe:2.3:h:sony:vaio_media_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:vaio_media_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:vaio_media_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:vaio_media_server:5.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-9j59-75qj-795w | Path traversal in Pillow | Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. | []
| 8.8 | 9.1 | null | null |
CVE-2017-18431 | cPanel before 66.0.1 does not reliably perform suspend/unsuspend operations on accounts (CPANEL-13941). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-xpvq-w32j-6px4 | A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::ParseSkinLump_3DGS_MDL7 of the file assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. The manipulation leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future. | []
| 4.8 | 3.3 | null | null |
|
CVE-2017-14082 | An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system. | [
"cpe:2.3:a:trendmicro:mobile_security:*:*:*:*:enterprise:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2021-37806 | An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database. | [
"cpe:2.3:a:phpgurukul:vehicle_parking_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
CVE-2023-29570 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | [
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2023-29212 | xwiki.platform:xwiki-platform-panels-ui Eval Injection vulnerability | XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:14.10:rc1:*:*:*:*:*:*"
]
| null | 10 | null | null |
GHSA-vr5f-m5f2-8mpp | Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field. | []
| null | null | null | null |
|
CVE-2017-10943 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4738. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.0.14878:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-v2j6-8h5x-h578 | The vulnerability discovered in WordPress Perfect Brands for WooCommerce plugin (versions <= 2.0.4) allows server information exposure. | []
| null | null | null | null |
|
GHSA-qw22-8w9r-864h | io.micronaut.security:micronaut-security-oauth2 has invalid IdTokenClaimsValidator logic on aud | SummaryIdTokenClaimsValidator skips `aud` claim validation if token is issued by same identity issuer/provider.DetailsSee https://github.com/micronaut-projects/micronaut-security/blob/master/security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java#L202This logic violates point 3 of https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation.Workaround exists by setting `micronaut.security.token.jwt.claims-validators.audience` with valid values.
`micronaut.security.token.jwt.claims-validators.openid-idtoken` can be kept as default on.PoCShould probably be:ImpactAny OIDC setup using Micronaut where multiple OIDC applications exists for the same issuer but token auth are not meant to be shared.MitigationPlease upgrade to a patched `micronaut-security-oauth2` release as soon as possible.If you cannot upgrade, for example, if you are still using Micronaut Framework 2, you can patch your application by creating a replacement of `IdTokenClaimsValidatorReplacement` | []
| null | 6.5 | null | null |
CVE-2020-4341 | IBM Security Secret Server 10.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 178181. | [
"cpe:2.3:a:ibm:security_secret_server:*:*:*:*:*:*:*:*"
]
| null | null | 2.7 | null |
|
CVE-2018-10850 | 389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service. | [
"cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
]
| null | null | 5.9 | null |
|
GHSA-6jh5-fcvp-frc9 | In the Linux kernel, the following vulnerability has been resolved:KVM: arm64: Don't retire aborted MMIO instructionReturning an abort to the guest for an unsupported MMIO access is a
documented feature of the KVM UAPI. Nevertheless, it's clear that this
plumbing has seen limited testing, since userspace can trivially cause a
WARN in the MMIO return:WARNING: CPU: 0 PID: 30558 at arch/arm64/include/asm/kvm_emulate.h:536 kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536
Call trace:
kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536
kvm_arch_vcpu_ioctl_run+0x98/0x15b4 arch/arm64/kvm/arm.c:1133
kvm_vcpu_ioctl+0x75c/0xa78 virt/kvm/kvm_main.c:4487
__do_sys_ioctl fs/ioctl.c:51 [inline]
__se_sys_ioctl fs/ioctl.c:893 [inline]
__arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:893
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x1e0/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x38/0x68 arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598The splat is complaining that KVM is advancing PC while an exception is
pending, i.e. that KVM is retiring the MMIO instruction despite a
pending synchronous external abort. Womp womp.Fix the glaring UAPI bug by skipping over all the MMIO emulation in
case there is a pending synchronous exception. Note that while userspace
is capable of pending an asynchronous exception (SError, IRQ, or FIQ),
it is still safe to retire the MMIO instruction in this case as (1) they
are by definition asynchronous, and (2) KVM relies on hardware support
for pending/delivering these exceptions instead of the software state
machine for advancing PC. | []
| null | null | null | null |
|
PYSEC-2021-417 | null | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | []
| null | null | null | null |
RHSA-2021:1242 | Red Hat Security Advisory: mariadb:10.3 and mariadb-devel:10.3 security update | mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 7.2 | null | null |
ICSA-21-040-06 | ICSA-21-040-06_Siemens JT2Go and Teamcenter Visualization (Update A) | Affected applications lack proper validation of user-supplied data when parsing ASM files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11899) Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information. (ZDI-CAN-12040) Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information. (ZDI-CAN-12042) Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12041) Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12043) | []
| null | 7.8 | null | null |
CVE-2024-23649 | Any authenticated user may obtain private message details from other users on the same instance | Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports.
Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported:
Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance.
Version 0.19.1 contains a patch for this issue. A workaround is available. If an update to a fixed Lemmy version is not immediately possible, the API route can be blocked in the reverse proxy. This will prevent anyone from reporting private messages, but it will also prevent exploitation before the update has been applied. | [
"cpe:2.3:a:join-lemmy:lemmy:*:*:*:*:*:rust:*:*"
]
| null | 7.5 | null | null |
CVE-2023-36486 | The workflow-engine of ILIAS before 7.23 and 8 before 8.3 allows remote authenticated users to run arbitrary system commands on the application server as the application user by uploading a workflow definition file with a malicious filename. | [
"cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-hgc7-5rw6-5h4m | NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php. | []
| null | null | null | null |
|
CVE-2020-23171 | A vulnerability in all versions of Nim-lang allows unauthenticated attackers to write files to arbitrary directories via a crafted zip file with dot-slash characters included in the name of the crafted file. | [
"cpe:2.3:a:nim-lang:nim-lang:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-wf9p-rrmg-53wp | The Bluetooth Low Energy (BLE) subsystem on Tapplock devices before 2018-06-12 relies on Key1 and SerialNo for unlock operations; however, these are derived from the MAC address, which is broadcasted by the device. | []
| null | null | 6.5 | null |
|
GHSA-j62w-ww35-j48j | Multiple buffer overflows in Novell iChain 2.1 before Field Patch 3, and iChain 2.2 before Field Patch 1a, allow attackers to cause a denial of service (ABEND) and possibly execute arbitrary code via (1) a long user name or (2) an unknown attack related to a "special script against login." | []
| null | null | null | null |
|
GHSA-xpc3-gf76-6g72 | Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access. | []
| null | null | null | null |
|
GHSA-c5fx-j8fg-j8qw | Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
|
CVE-2012-3791 | Multiple SQL injection vulnerabilities in Simple Web Content Management System 1.1 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) item_delete.php, (2) item_status.php, (3) item_detail.php, (4) item_modify.php, or (5) item_position.php in admin/; or (6) status parameter to admin/item_status.php. | [
"cpe:2.3:a:cms-center:simple_web_content_management_system:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-36c8-x5g7-w9x4 | Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | []
| null | 6.5 | null | null |
|
CVE-2018-17771 | Ingenico Telium 2 POS terminals have hardcoded FTP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N. | [
"cpe:2.3:o:ingenico:telium_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ingenico:telium_2:-:*:*:*:*:*:*:*"
]
| null | 6.6 | null | 7.2 |
|
GHSA-38f4-wx3j-w2g9 | Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1. | []
| null | 6.5 | null | null |
|
CVE-2021-23344 | Remote Code Execution (RCE) | The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | [
"cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:*"
]
| null | 9.8 | null | null |
CVE-2023-21291 | In visitUris of Notification.java, there is a possible way to reveal image contents from another user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2020-21047 | The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks. | [
"cpe:2.3:a:elfutils_project:elfutils:0.177:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-xp88-vp78-mqm7 | Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally. | []
| null | 7 | null | null |
|
CVE-2022-49624 | net: atlantic: remove aq_nic_deinit() when resume | In the Linux kernel, the following vulnerability has been resolved:
net: atlantic: remove aq_nic_deinit() when resume
aq_nic_deinit() has been called while suspending, so we don't have to call
it again on resume.
Actually, call it again leads to another hang issue when resuming from
S3.
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992345] Call Trace:
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992346] <TASK>
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992348] aq_nic_deinit+0xb4/0xd0 [atlantic]
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992356] aq_pm_thaw+0x7f/0x100 [atlantic]
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992362] pci_pm_resume+0x5c/0x90
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992366] ? pci_pm_thaw+0x80/0x80
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992368] dpm_run_callback+0x4e/0x120
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992371] device_resume+0xad/0x200
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992373] async_resume+0x1e/0x40
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992374] async_run_entry_fn+0x33/0x120
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992377] process_one_work+0x220/0x3c0
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992380] worker_thread+0x4d/0x3f0
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992382] ? process_one_work+0x3c0/0x3c0
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992384] kthread+0x12a/0x150
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992386] ? set_kthread_struct+0x40/0x40
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992387] ret_from_fork+0x22/0x30
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992391] </TASK>
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992392] ---[ end trace 1ec8c79604ed5e0d ]---
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992394] PM: dpm_run_callback(): pci_pm_resume+0x0/0x90 returns -110
Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992397] atlantic 0000:02:00.0: PM: failed to resume async: error -110 | []
| null | null | null | null |
CVE-2023-21167 | In setProfileName of DevicePolicyManagerService.java, there is a possible way to crash the SystemUI menu due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259942964 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.