id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-6c85-3xgv-h22r | Cross-site scripting (XSS) vulnerability in MercuryBoard before 1.1.3 allows remote attackers to inject arbitrary web script or HTML via the title field of a PM (private message). | []
| null | null | null | null |
|
CVE-2021-22010 | The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service. | [
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2019-2421 | Vulnerability in the PeopleSoft Enterprise HCM eProfile Manager Desktop component of Oracle PeopleSoft Products (subcomponent: Guided Self Service). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM eProfile Manager Desktop. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM eProfile Manager Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM eProfile Manager Desktop accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM eProfile Manager Desktop accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_eprofile_manager_desktop:9.2:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 5.8 |
|
RHSA-2021:4601 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
]
| null | 8.5 | null | null |
GHSA-2q2f-h83x-cx3x | Reportico Web fails to invalidate cookies upon logout | An issue in Reportico Web before v.8.1.0. This vulnerability arises from the failure of the web application to properly invalidate session cookies upon logout. When a user logs out of the application, the session cookie should be invalidated to prevent unauthorized access. However, due to the oversight in the application's implementation, the session cookie remains active even after logout. Consequently, if an attacker obtains the session cookie, they can exploit it to access the user's session and perform unauthorized actions. | []
| null | 6.5 | null | null |
GHSA-v7wf-7rp9-g53p | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in webbytemplate Office Locator.This issue affects Office Locator: from n/a through 1.3.0. | []
| null | 7.5 | null | null |
|
GHSA-gfqc-77c8-mw92 | SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter. | []
| null | null | 8.8 | null |
|
GHSA-4hjw-gj2g-h3cx | Windows Kernel Elevation of Privilege Vulnerability | []
| null | 7.8 | null | null |
|
GHSA-4vhm-j5mp-9wcg | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Koch Mendeley Plugin plugin <= 1.3.2 versions. | []
| null | 5.9 | null | null |
|
GHSA-28vw-p2m2-24ww | IBM Informix Dynamic Server (IDS) before 9.40.xC7 and 10.00 before 10.00.xC3 allows local users to cause a denial of service (crash) via unspecified vectors. | []
| null | null | null | null |
|
GHSA-6546-f3c3-rp4g | Cross-site scripting (XSS) vulnerability in Bugzilla 3.7.1, 3.7.2, 3.7.3, and 4.0rc1 allows remote attackers to inject arbitrary web script or HTML via the real name field of a user account, related to the AutoComplete widget in YUI. | []
| null | null | null | null |
|
RHSA-2020:3222 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free in sound/core/timer.c kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: kernel: DAX hugepages not considered during mremap kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario kernel: lockdown: bypass through ACPI write via acpi_configfs | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
]
| null | 6.4 | null | null |
CVE-2020-13631 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. | [
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
RHSA-2002:196 | Red Hat Security Advisory: : Updated xinetd packages fix denial of service vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
]
| null | null | null | null |
CVE-2023-37345 | Kofax Power PDF J2K File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Kofax Power PDF J2K File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of J2K files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20442. | [
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
CVE-2016-1743 | The Intel driver in the Graphics Drivers subsystem in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1744. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
CVE-2019-1215 | An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
GHSA-jrxr-vw4j-prv8 | SQL injection vulnerability in mod_sql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the query string of the URL. | []
| null | null | null | null |
|
GHSA-g6mx-39hp-44rm | Incomplete blacklist vulnerability in the filemanager in Frederico Caldeira Knabben FCKeditor 2.4.2 allows remote attackers to upload arbitrary .php files via an alternate data stream syntax, as demonstrated by .php::$DATA filenames, a related issue to CVE-2006-0658. | []
| null | null | null | null |
|
GHSA-q3cq-6xv8-j4p3 | The Calculated Fields Form WordPress plugin before 5.2.64 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
|
GHSA-2h3h-q99f-3fhc | @npmcli/arborist vulnerable to UNIX Symbolic Link (Symlink) Following | ImpactArbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies.When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem.For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed.Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected.Patches2.8.2 (included in npm v7.20.7 and above)Fix and CaveatsThere are two parts to the fix:Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.)The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision.This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems.If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file. | []
| null | 8.2 | null | null |
CVE-2022-32047 | TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc parameter in the function FUN_00412ef4. | [
"cpe:2.3:o:totolink:t6_firmware:4.1.9cu.5179_b20201015:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t6:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-hf8q-f7qp-4r6g | The import/export functionality in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, and 8.5.x through 8.5.5 allows remote authenticated users to bypass intended access restrictions via a project action for a (1) process application or (2) toolkit. | []
| null | null | null | null |
|
CVE-2009-4437 | Multiple SQL injection vulnerabilities in Active Auction House 3.6 allow remote attackers to execute arbitrary SQL commands via the (1) catid parameter to wishlist.asp and the (2) linkid parameter to links.asp. NOTE: vector 1 might overlap CVE-2005-1029.1. | [
"cpe:2.3:a:activewebsoftwares:active_auction_house:3.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2008-6232 | Pre Shopping Mall allows remote attackers to bypass authentication and gain administrative access by setting the (1) adminname and the (2) adminid cookies to "admin". | [
"cpe:2.3:a:preprojects:pre_shopping_mall:-:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-7f7f-v228-3845 | Memory leak in Cisco IOS before 15.0(1)XA5 might allow remote attackers to cause a denial of service (memory consumption) by sending a crafted SIP REGISTER message over UDP, aka Bug ID CSCtg41733. | []
| null | null | null | null |
|
RHSA-2016:2702 | Red Hat Security Advisory: policycoreutils security update | policycoreutils: SELinux sandbox escape via TIOCSTI ioctl | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 8.6 | null |
GHSA-9gjg-834p-5gvv | Duplicate Advisory: Keylime's registrar vulnerable to Denial-of-service attack via a single open connection | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-pg75-v6fp-8q59. This link is maintained to preserve external references.Original DescriptionA flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections. | []
| null | 7.5 | null | null |
RHSA-2022:0446 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
]
| null | 8.8 | null | null |
GHSA-xwrf-hhx9-vmhv | In the Linux kernel, the following vulnerability has been resolved:RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requestsThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice
on the same id_priv. While this cannot happen without going through the
work, it violates the invariant that the same address resolution
background request cannot be active twice.rdma_resolve_addr():
RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler) #1rdma_resolve_addr():
RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler)
!! two requests are now on the req_listrdma_destroy_id():
destroy_id_handler_unlock():
_destroy_id():
cma_cancel_operation():
rdma_addr_cancel()kfree(id_priv)rdma_addr_cancel() expects there to be one req on the list and only
cancels the first one. The self-removal behavior of the work only happens
after the handler has returned. This yields a situations where the
req_list can have two reqs for the same "handle" but rdma_addr_cancel()
only cancels the first one.The second req remains active beyond rdma_destroy_id() and will
use-after-free id_priv once it inevitably triggers.Fix this by remembering if the id_priv has called rdma_resolve_ip() and
always cancel before calling it again. This ensures the req_list never
gets more than one item in it and doesn't cost anything in the normal flow
that never uses this strange error path. | []
| null | null | null | null |
|
RHSA-2023:1445 | Red Hat Security Advisory: firefox security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.8 | null | null |
CVE-2012-5148 | The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors. | [
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-47174 | Credential leak when credentials are used with `<nix/fetchurl.nix>` | Nix is a package manager for Linux and other Unix systems. Starting in version 1.11 and prior to versions 2.18.8 and 2.24.8, `<nix/fetchurl.nix>` did not verify TLS certificates on HTTPS connections. This could lead to connection details such as full URLs or credentials leaking in case of a man-in-the-middle (MITM) attack. `<nix/fetchurl.nix>` is also known as the builtin derivation builder `builtin:fetchurl`. It's not to be confused with the evaluation-time function `builtins.fetchurl`, which was not affected by this issue. A user may be affected by the risk of leaking credentials if they have a `netrc` file for authentication, or rely on derivations with `impureEnvVars` set to use credentials from the environment. In addition, the commonplace trust-on-first-use (TOFU) technique of updating dependencies by specifying an invalid hash and obtaining it from a remote store was also vulnerable to a MITM injecting arbitrary store objects. This also applied to the impure derivations experimental feature. Note that this may also happen when using Nixpkgs fetchers to obtain new hashes when not using the fake hash method, although that mechanism is not implemented in Nix itself but rather in Nixpkgs using a fixed-output derivation. The behavior was introduced in version 1.11 to make it consistent with the Nixpkgs `pkgs.fetchurl` and to make `<nix/fetchurl.nix>` work in the derivation builder sandbox, which back then did not have access to the CA bundles by default. Nowadays, CA bundles are bind-mounted on Linux. This issue has been fixed in Nix 2.18.8 and 2.24.8. As a workaround, implement (authenticated) fetching with `pkgs.fetchurl` from Nixpkgs, using `impureEnvVars` and `curlOpts` as needed. | []
| null | 5.9 | null | null |
CVE-2021-33661 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
CVE-2023-52953 | Path traversal vulnerability in the Medialibrary module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*"
]
| null | 6.2 | null | null |
|
CVE-2023-5929 | Campcodes Simple Student Information System manage_academic.php sql injection | A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/students/manage_academic.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244329 was assigned to this vulnerability. | [
"cpe:2.3:a:simple_student_information_system_project:simple_student_information_system:1.0:*:*:*:*:*:*:*"
]
| null | 5.5 | 5.5 | 5.2 |
GHSA-prx9-98cr-w8j7 | A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was found. | []
| null | null | 7.5 | null |
|
GHSA-8gv2-77q2-fg43 | Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. | []
| null | null | 9.8 | null |
|
CVE-2025-35003 | Apache NuttX RTOS: NuttX Bluetooth Stack HCI and UART DoS/RCE Vulnerabilities. | Improper Restriction of Operations within the Bounds of a Memory Buffer and Stack-based Buffer Overflow vulnerabilities were discovered in Apache NuttX RTOS Bluetooth Stack (HCI and UART components) that may result in system crash, denial of service, or arbitrary code execution, after receiving maliciously crafted packets.
NuttX's Bluetooth HCI/UART stack users are advised to upgrade to version 12.9.0, which fixes the identified implementation issues.
This issue affects Apache NuttX: from 7.25 before 12.9.0. | []
| null | 9.8 | null | null |
GHSA-fgh9-3qvc-v2w3 | An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (out-of-bounds read) via a crafted app. | []
| null | null | 7.8 | null |
|
GHSA-6jg9-q26r-4x67 | The Sandbox Profiles component in Apple iOS before 10 does not properly restrict access to directory metadata for SMS draft directories, which allows attackers to discover text-message recipients via a crafted app. | []
| null | null | 3.3 | null |
|
GHSA-qmqf-cwh8-932m | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | []
| null | null | null | null |
|
GHSA-rvg2-pv9x-xxhg | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix slab-use-after-free on hdcp_work[Why]
A slab-use-after-free is reported when HDCP is destroyed but the
property_validate_dwork queue is still running.[How]
Cancel the delayed work when destroying workqueue.(cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128) | []
| null | 7.8 | null | null |
|
CVE-2022-38351 | A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page. | [
"cpe:2.3:a:supremainc:biostar_2:2.8.16:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-f2fm-6xq7-v8j8 | File Upload vulnerability in LJCMS v.4.3.R60321 allows a remote attacker to execute arbitrary code via the ljcms/index.php parameter. | []
| null | 9.8 | null | null |
|
RHSA-2011:0395 | Red Hat Security Advisory: gdm security update | gdm: privilege escalation vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2024-2267 | keerti1924 Online-Book-Store-Website shop.php logic error | A vulnerability was found in keerti1924 Online-Book-Store-Website 1.0 and classified as problematic. This issue affects some unknown processing of the file /shop.php. The manipulation of the argument product_price leads to business logic errors. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256037 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:keerti1924:online_bookstore:1.0:*:*:*:*:*:*:*"
]
| null | 4.3 | 4.3 | 4 |
GHSA-232p-m442-j9m4 | In the Linux kernel, the following vulnerability has been resolved:firmware: qcom: scm: smc: Handle missing SCM deviceCommit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer
dereference") makes it explicit that qcom_scm_get_tzmem_pool() can
return NULL, therefore its users should handle this. | []
| null | null | null | null |
|
GHSA-fr4g-hmc7-w66h | A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. | []
| null | 4.3 | null | null |
|
GHSA-qj9g-hm58-4rxj | SQL injection vulnerability in certain database classes in Jonas Gauffin Publicera 1.0-rc2 and earlier might allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | []
| null | null | null | null |
|
GHSA-4j94-jg47-hpc4 | Absolute path traversal vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1, 10.1.1, 10.2, and 10.2.1 allows remote authenticated users to read files by leveraging the Report Author privilege, a different vulnerability than CVE-2013-2978. | []
| null | null | null | null |
|
CVE-1999-0153 | Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-76hw-gx4c-xc29 | In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queueWhen the task management thread processes reply queues while the reset
thread resets them, the task management thread accesses an invalid queue ID
(0xFFFF), set by the reset thread, which points to unallocated memory,
causing a crash.Add flag 'io_admin_reset_sync' to synchronize access between the reset,
I/O, and admin threads. Before a reset, the reset handler sets this flag to
block I/O and admin processing threads. If any thread bypasses the initial
check, the reset thread waits up to 10 seconds for processing to finish. If
the wait exceeds 10 seconds, the controller is marked as unrecoverable. | []
| null | null | null | null |
|
CVE-2023-51528 | WordPress GPT3 AI Content Writer Plugin <= 1.8.12 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Senol Sahin AI Power: Complete AI Pack – Powered by GPT-4.This issue affects AI Power: Complete AI Pack – Powered by GPT-4: from n/a through 1.8.12.
| []
| null | 4.3 | null | null |
CVE-2024-34421 | WordPress BlogLentor – Blog Designer Pack for Elementor plugin <= 1.0.8 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsurface BlogLentor allows Stored XSS.This issue affects BlogLentor: from n/a through 1.0.8.
| []
| null | 6.5 | null | null |
RHSA-2024:2737 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-openstackclient) security update | openstack: deleting a non existing access rule deletes another existing access rule in it's scope | [
"cpe:/a:redhat:openstack:17.1::el9"
]
| null | 5.5 | null | null |
GHSA-69cm-jm55-39mv | Out of bounds read in V8 in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | []
| null | 8.8 | null | null |
|
CVE-2024-7366 | SourceCodester Tracking Monitoring Management System Login ajax.php sql injection | A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273345 was assigned to this vulnerability. | [
"cpe:2.3:a:sourcecodester:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*"
]
| 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-9vf5-cmfm-mmm4 | Motorola CX2L Router 1.0.1 was discovered to contain a command injection vulnerability via the staticroute_list parameter. | []
| null | 8.8 | null | null |
|
GHSA-mr56-3w7m-88hw | An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses. | []
| null | null | null | null |
|
GHSA-j3c8-xv8h-h8mv | Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. | []
| null | null | null | null |
|
CVE-2024-41454 | An arbitrary file upload vulnerability in the UI login page logo upload function of Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary code via uploading a crafted PHP or HTML file. | []
| null | 6.5 | null | null |
|
GHSA-4h56-hghf-36cj | Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. | []
| null | 9.1 | null | null |
|
CVE-2023-33779 | A lateral privilege escalation vulnerability in XXL-Job v2.4.1 allows users to execute arbitrary commands on another user's account via a crafted POST request to the component /jobinfo/. | [
"cpe:2.3:a:xuxueli:xxl-job:2.4.1:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-3x6j-h8cp-mc44 | Online Sports Complex Booking System v1.0 was discovered to allow attackers to take over user accounts via a crafted POST request. | []
| null | 9.8 | null | null |
|
GHSA-j7gh-88xh-vghc | Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php. | []
| null | null | null | null |
|
GHSA-jf76-w4vp-r5jp | The Slider Pro Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sliderpro' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2014-2741 | nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. | [
"cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2023-6212 | Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2021-21372 | Nimble arbitrary code execution for specially crafted package metadata | Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution. | [
"cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*"
]
| null | 8.3 | null | null |
CVE-2017-12075 | Command injection vulnerability in EZ-Internet in Synology DiskStation Manager (DSM) before 6.2-23739 allows remote authenticated users to execute arbitrary command via the username parameter. | [
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
]
| null | null | 7.2 | null |
|
GHSA-38q2-7hp2-xq9v | Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22. | []
| null | null | null | null |
|
CVE-2020-10942 | In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5.4 |
|
CVE-2018-5026 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
RHBA-2020:2785 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.11 packages update | python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
]
| null | null | 7.5 | null |
GHSA-59f9-39vx-2r92 | IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 296003. | []
| null | 6.5 | null | null |
|
CVE-2020-11104 | An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if the archive is distributed outside of a trusted context. | [
"cpe:2.3:a:usc:cereal:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2020-7524 | Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when sending specific crafted IPV4 packet to the controller: Sending a specific IPv4 protocol package to Schneider Electric Modicon M218 Logic Controller can cause IPv4 devices to go down. The device does not work properly and must be powered back on to return to normal. | [
"cpe:2.3:o:schneider-electric:modicon_m218_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m218:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2025-32656 | WordPress Testimonial Slider and Showcase Pro plugin <= 2.3.15 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Testimonial Slider And Showcase Pro allows PHP Local File Inclusion. This issue affects Testimonial Slider And Showcase Pro: from n/a through 2.3.15. | []
| null | 8.1 | null | null |
CVE-2018-11686 | The Publish Service in FlexPaper (later renamed FlowPaper) 2.3.6 allows remote code execution via setup.php and change_config.php. | [
"cpe:2.3:a:flowpaper:flexpaper:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2018-3875 | An exploitable buffer overflow vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250-Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. The strncpy overflows the destination buffer, which has a size of 2,000 bytes. An attacker can send an arbitrarily long "sessionToken" value in order to exploit this vulnerability. | [
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
]
| null | null | 9.9 | null |
|
GHSA-53rm-5h2m-g3vh | FastStone Image Viewer 7.5 has an out-of-bounds write (via a crafted image file) at FSViewer.exe+0x956e. | []
| null | null | null | null |
|
PYSEC-2020-49 | null | ** DISPUTED ** jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data. | []
| null | null | null | null |
CVE-2018-5370 | BizLogic xnami 1.0 has XSS via the comment parameter in an addComment action to the /media/ajax URI. | [
"cpe:2.3:a:bizlogicdev:xnami:1.0:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2022-35806 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:azure_real_time_operating_system_guix_studio:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2002-1967 | Buffer overflow in XiRCON 1.0 Beta 4 allows remote attackers to cause a denial of service (disconnect) via a long (1) ctcp, (2) primsg, (3) msg, or (4) notice command. | [
"cpe:2.3:a:mark_hanson:xircon:1.0_beta_4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-jr5h-gxvq-3v3w | The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. | []
| null | null | null | null |
|
GHSA-5xqh-j4c7-9pg5 | Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers. | []
| null | null | null | null |
|
CVE-2004-1863 | Multiple cross-site scripting (XSS) vulnerabilities in XMB (aka extreme message board) 1.9 beta (aka Nexus beta) allow remote attackers to inject arbitrary web script or HTML via (1) the u2uheader parameter in editprofile.php, the restrict parameter in (2) member.php, (3) misc.php, and (4) today.php, and (5) an arbitrary parameter in phpinfo.php. | [
"cpe:2.3:a:xmb_forum:xmb:1.8_sp3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.9_beta:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2012-5505 | atat.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read private data structures via a request for a view without a name. | [
"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2025-1016 | Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. | []
| null | 9.8 | null | null |
|
GHSA-rxxw-x8j3-4f4f | A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. | []
| null | 6.7 | null | null |
|
RHSA-2024:4937 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 7.5 | null | null |
CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | [
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:ark:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2021-29265 | An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 4.7 | null | 4.7 |
|
GHSA-j6rh-h9wc-gh7j | The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions). | []
| null | 9.8 | null | null |
|
GHSA-qx9v-hvpm-x8mw | Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to an "input validation issue." | []
| null | null | null | null |
|
CVE-2021-22318 | A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
GHSA-wrq2-h2ff-mxv5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Smart Editor JoomUnited allows Reflected XSS.This issue affects JoomUnited: from n/a through 1.3.3. | []
| null | 7.1 | null | null |
|
GHSA-cwhx-q6wr-fwvc | An improper export vulnerability was reported in the Motorola Interface Test Tool application that could allow a malicious local application to execute OS commands. | []
| null | 4.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.