id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-1945
|
Coming Soon and Maintenance by Colorlib < 1.0.99 - Admin+ Stored Cross Site Scripting
|
The Coming Soon & Maintenance Mode by Colorlib WordPress plugin before 1.0.99 does not sanitize and escape some settings, allowing high privilege users such as admin to perform Stored Cross-Site Scripting when unfiltered_html is disallowed (for example in multisite setup)
|
[
"cpe:2.3:a:colorlib:coming_soon_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2019-13181
|
A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7.
|
[
"cpe:2.3:a:solarwinds:serv-u_ftp_server:15.1.7:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-8qpx-3xqh-7q35
|
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /WorkFlow/wf_office_file_history_show.aspx.
|
[] | null | 9.8 | null | null |
|
CVE-2016-6916
|
Integer overflow in nvhost_job.c in the NVIDIA video driver for Android, Shield TV before OTA 3.3, Shield Table before OTA 4.4, and Shield Table TK1 before OTA 1.5 allows local users to cause a denial of service (system crash) via unspecified vectors, which triggers a buffer overflow.
|
[
"cpe:2.3:o:nvidia:shield_tablet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:shield_tablet_tk1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tablet_tk1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:shield_tv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:video_driver:-:*:*:*:*:android:*:*",
"cpe:2.3:h:google:nexus_9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_c:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2024-7154
|
TOTOLINK A3700R Password Reset wizard.html access control
|
A vulnerability, which was classified as problematic, was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is an unknown function of the file /wizard.html of the component Password Reset Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272568. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*"
] | 5.3 | 4.3 | 4.3 | 4 |
GHSA-frf6-mj64-p4rr
|
Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability when the product is in its default configuration.The specific flaw exists within the handling of NodeManagerOpcUa objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20577.
|
[] | null | null | 9.1 | null |
|
PYSEC-2022-188
| null |
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue.
|
[] | null | null | null | null |
CVE-2021-42048
|
An issue was discovered in the Growth extension in MediaWiki through 1.36.2. Any admin can add arbitrary JavaScript code to the Newcomer home page footer, which can be executed by viewers with zero edits.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
RHSA-2023:7478
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.54 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
GHSA-9fcx-f5h9-vrwq
|
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Import/Export). The supported version that is affected is 2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 7.5 | null |
|
GHSA-jh7q-5mwf-qvhw
|
Keycloak vulnerable to Server-Side Request Forgery
|
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter `request_uri`. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
|
[] | null | 5.3 | null | null |
GHSA-3863-q6pp-rrcg
|
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19
are vulnerable to cross-site request forgery (CSRF). An external
attacker with no access to the device can force the end user into
submitting a "setconf" method request, not requiring any CSRF token,
which can lead into denial of service on the device.
|
[] | 6.3 | 7.4 | null | null |
|
GHSA-q297-5xx3-gw53
|
Improper authorization in GitLab EE affecting all versions since 13.4 allowed a user who previously had the necessary access to trigger deployments to protected environments under specific conditions after the access has been removed
|
[] | null | null | null | null |
|
CVE-2025-23141
|
KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
|
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
Acquire a lock on kvm->srcu when userspace is getting MP state to handle a
rather extreme edge case where "accepting" APIC events, i.e. processing
pending INIT or SIPI, can trigger accesses to guest memory. If the vCPU
is in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP
state will trigger a nested VM-Exit by way of ->check_nested_events(), and
emuating the nested VM-Exit can access guest memory.
The splat was originally hit by syzkaller on a Google-internal kernel, and
reproduced on an upstream kernel by hacking the triple_fault_event_test
selftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a
memory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.
=============================
WARNING: suspicious RCU usage
6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted
-----------------------------
include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
1 lock held by triple_fault_ev/1256:
#0: ffff88810df5a330 (&vcpu->mutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]
stack backtrace:
CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
Call Trace:
<TASK>
dump_stack_lvl+0x7f/0x90
lockdep_rcu_suspicious+0x144/0x190
kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]
kvm_vcpu_read_guest+0x3e/0x90 [kvm]
read_and_check_msr_entry+0x2e/0x180 [kvm_intel]
__nested_vmx_vmexit+0x550/0xde0 [kvm_intel]
kvm_check_nested_events+0x1b/0x30 [kvm]
kvm_apic_accept_events+0x33/0x100 [kvm]
kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]
kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]
__x64_sys_ioctl+0x8b/0xb0
do_syscall_64+0x6c/0x170
entry_SYSCALL_64_after_hwframe+0x4b/0x53
</TASK>
|
[] | null | null | null | null |
CVE-2024-44557
|
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.
|
[
"cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
|
GHSA-6hw8-whvq-hmwp
|
The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system.Exploitation Status:Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.Workarounds or Mitigation:There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
|
[] | null | 6.7 | null | null |
|
CVE-2004-2742
|
Cross-site scripting (XSS) vulnerability in the report viewer in Crystal Enterprise 8.5, 9, and 10 allows remote attackers to inject arbitrary web script or HTML via script in the URL to a report (RPT) file.
|
[
"cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:aix:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:solaris:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:9:*:windows:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:aix:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:hpux:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:linux:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:solaris:*:*:*:*:*",
"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:windows:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-37778
|
Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the current_time parameter of the time function.
|
[
"cpe:2.3:o:phicomm:fir151b_firmware:3.0.1.17:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:fir151b:a2:*:*:*:*:*:*:*",
"cpe:2.3:o:phicomm:fir302e_firmware:3.0.1.17:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:fir302e:a2:*:*:*:*:*:*:*",
"cpe:2.3:o:phicomm:fir300b_firmware:3.0.1.17:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:fir300b:a2:*:*:*:*:*:*:*",
"cpe:2.3:o:phicomm:fir303b_firmware:3.0.1.17:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:fir303b:a2:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-p95x-f93r-h96r
|
CRLF injection vulnerability in layers_toggle.php in WebCalendar 1.0.1 might allow remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via the ret parameter, which is used to redirect URL requests.
|
[] | null | null | null | null |
|
CVE-2013-4665
|
SPBAS Business Automation Software 2012 has CSRF.
|
[
"cpe:2.3:a:spbas:business_automation_software:2012:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2019-7739
|
An issue was discovered in Joomla! before 3.9.3. The "No Filtering" textfilter overrides child settings in the Global Configuration. This is intended behavior. However, it might be unexpected for the user because the configuration dialog lacks an additional message to explain this.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2019-16413
|
An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2016-9685
|
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
CVE-2015-5082
|
Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi.
|
[
"cpe:2.3:a:endian_firewall:endian_firewall:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-w8f6-g5xv-w78j
|
Sphinx Technologies Sphinx 3.1.1 by default has no authentication and listens on 0.0.0.0, making it exposed to the internet (unless filtered by a firewall or reconfigured to listen to 127.0.0.1 only).
|
[] | null | null | 7.5 | null |
|
GHSA-74c3-jxfp-3xjc
|
Out of bound access in WLAN driver due to lack of validation of array length before copying into array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
|
[] | null | null | null | null |
|
GHSA-wrv4-mqvj-wcxg
|
The Linksys WRT54G router has "admin" as its default FTP password, which allows remote attackers to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.
|
[] | null | null | null | null |
|
GHSA-6j67-827v-pg7q
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Interfacelab Media Cloud for Amazon S3, Imgix, Google Cloud Storage, DigitalOcean Spaces and more allows Stored XSS.This issue affects Media Cloud for Amazon S3, Imgix, Google Cloud Storage, DigitalOcean Spaces and more: from n/a through 4.5.24.
|
[] | null | 6.5 | null | null |
|
GHSA-8qc8-27v8-7664
|
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
|
[] | null | null | 4.4 | null |
|
CVE-2006-0033
|
Unspecified vulnerability in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted PNG image that triggers memory corruption when it is parsed.
|
[
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-63c3-hhxg-g55x
|
CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
|
[] | null | 7.8 | null | null |
|
CVE-2018-6036
|
Insufficient data validation in V8 in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user data via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
RHSA-2016:1141
|
Red Hat Security Advisory: ntp security update
|
ntp: off-path denial of service on authenticated broadcast mode ntp: crypto-NAK preemptable association denial of service ntp: ntpd switching to interleaved mode with spoofed packets ntp: libntp message digest disclosure ntp: out-of-bounds references on crafted packet
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2020-27576
|
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
|
[
"cpe:2.3:a:maxum:rumpus:8.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:maxum:rumpus:8.2.14:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-gmwg-m5q2-qr9g
|
The Weather Effect WordPress plugin before 1.3.4 does not have any CSRF checks in place when saving its settings, and do not validate or escape them, which could lead to Stored Cross-Site Scripting issue.
|
[] | null | 5.4 | null | null |
|
GHSA-2523-xvgc-mmh8
|
Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null |
|
CVE-2007-2234
|
include/common.php in PunBB 1.2.14 and earlier does not properly handle a disabled ini_get function when checking the register_globals setting, which allows remote attackers to register global parameters, as demonstrated by an SQL injection attack on the search_id parameter to search.php.
|
[
"cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-34701
|
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability
|
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-5mvq-965r-h693
|
There is a heap based buffer overflow in tools/tiff2pdf.c of LibTIFF 4.0.8 via a PlanarConfig=Contig image, which causes a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack.
|
[] | null | null | 8.8 | null |
|
GHSA-qfcq-5rf4-6g68
|
The WP Post Popup WordPress plugin through 3.7.3 does not sanitise and escape some of its inputs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8 | null | null |
|
GHSA-fqfj-7h7r-fmwr
|
Format string vulnerability in Crob FTP Server 2.60.1 allows remote attackers to cause a denial of service (crash) via "%s" or "%n" sequences in (1) the username during login, or other FTP commands such as (2) dir.
|
[] | null | null | null | null |
|
GHSA-rx9x-6579-mmvf
|
SQL injection vulnerability in xmap (com_xmap) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
|
[] | null | null | null | null |
|
GHSA-fpcq-7xx3-h92j
|
Buffer overflow in Skia in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null |
|
RHSA-2016:0010
|
Red Hat Security Advisory: samba4 security update
|
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code libldb: remote memory read in the Samba LDAP server samba: DoS to AD-DC due to insufficient checking of asn1 memory allocation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-mhfw-47p6-9px9
|
IBM has identified a vulnerability with IBM Spectrum Scale/GPFS utilized on the Elastic Storage Server (ESS)/GPFS Storage Server (GSS) during testing of an unsupported configuration, where users applications are running on an active ESS I/O server node and utilize direct I/O to perform a read or a write to a Spectrum Scale file. This vulnerability may result in the use of an incorrect memory address, leading to a Spectrum Scale/GPFS daemon failure with a Signal 11, and possibly leading to denial of service or undetected data corruption. IBM X-Force ID: 125458.
|
[] | null | 6.2 | null | null |
|
CVE-2020-25684
|
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
|
[
"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | 4.3 |
|
CVE-2021-40765
|
Adobe Character Animator Memory Corruption could lead to Arbitrary code execution
|
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
|
[
"cpe:2.3:a:adobe:character_animator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-mvqh-rjw3-3ppc
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.42 and prior to 7.0.6. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 8.1 | null | null |
|
CVE-2021-24588
|
SMS Alert Order Notifications – WooCommerce < 3.4.7 Authenticated Cross Site Scripting
|
The SMS Alert Order Notifications WordPress plugin before 3.4.7 is affected by a cross site scripting (XSS) vulnerability in the plugin's setting page.
|
[
"cpe:2.3:a:cozyvision:sms_alert_order_notifications:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
ICSA-23-320-12
|
Siemens PNI
|
.NET and Visual Studio Information Disclosure Vulnerability. zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference). NuGet Client Elevation of Privilege Vulnerability. .NET and Visual Studio Remote Code Execution Vulnerability .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability .NET DLL Hijacking Remote Code Execution Vulnerability .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability .NET and Visual Studio Elevation of Privilege Vulnerability .NET and Visual Studio Remote Code Execution Vulnerability .NET and Visual Studio Remote Code Execution Vulnerability .NET and Visual Studio Elevation of Privilege Vulnerability
|
[] | null | 7.3 | null | null |
CVE-2005-2646
|
Unknown vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to cause a denial of service or read files via unknown vectors involving crafted HTTP requests.
|
[
"cpe:2.3:h:xerox:document_centre_220:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_230:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_240:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_255:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_265:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_332:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_340:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_420:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_425:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_426:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_430:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_432:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_440:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_460:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_470:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_480:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_490:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_535:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_545:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:document_centre_555:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2022-36578
|
jizhicms v2.3.1 has SQL injection in the background.
|
[
"cpe:2.3:a:jizhicms:jizhicms:2.3.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-253g-g2mf-qcvg
|
IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 uses weak permissions for unspecified resources, which allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors.
|
[] | null | null | 6.8 | null |
|
CVE-2010-2856
|
Cross-site scripting (XSS) vulnerability in admin/currencies.php in osCSS 1.2.2, and probably earlier versions, allows remote attackers to inject arbitrary web script or HTML via the page parameter.
|
[
"cpe:2.3:a:oscss:oscss:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.2.2:rc:*:*:*:*:*:*",
"cpe:2.3:a:oscss:oscss:1.2.2:rca:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-6p3g-hw27-qh44
|
Moodle's time-validation implementation allows bypassing intended restrictions
|
The time-validation implementation in (1) mod/feedback/complete.php and (2) mod/feedback/complete_guest.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote authenticated users to bypass intended restrictions on starting a Feedback activity by choosing an unavailable time.
|
[] | null | null | null | null |
GHSA-p26f-fw78-p227
|
Cross-Site Request Forgery (CSRF) vulnerability in alexvtn WIP WooCarousel Lite allows Stored XSS. This issue affects WIP WooCarousel Lite: from n/a through 1.1.7.
|
[] | null | 7.1 | null | null |
|
CVE-2022-20115
|
In broadcastServiceStateChanged of TelephonyRegistry.java, there is a possible way to learn base station information without location permission due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-210118427
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2021-2478
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-wcr5-q7f2-vcxr
|
IBM Rational DOORS Next Generation 5.0 through 5.0.2, 6.0 through 6.0.5 and IBM Rational Requirements Composer 5.0 through 5.0.2 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142291.
|
[] | null | null | 5.4 | null |
|
GHSA-c649-279m-q7qv
|
A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow.
|
[] | null | 9.8 | null | null |
|
CVE-2020-9690
|
Magento versions 2.3.5-p1 and earlier, and 2.3.5-p1 and earlier have an observable timing discrepancy vulnerability. Successful exploitation could lead to signature verification bypass.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:open_source:*:*:*"
] | null | 4.2 | null | 3.5 |
|
CVE-2011-3999
|
Cross-site scripting (XSS) vulnerability in the RSS/Atom feed-reader implementation in Iwate Portal Bar allows remote attackers to inject arbitrary web script or HTML via a crafted feed.
|
[
"cpe:2.3:a:ibc.co.jp:iwate_portal_bar:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-h4ph-6x2m-2wv3
|
Multiple PHP remote file inclusion vulnerabilities in Security Images (com_securityimages) component 3.0.5 and earlier for Joomla! allow remote attackers to execute arbitrary code via a URL in the mosConfig_absolute_path parameter in (1) configinsert.php, (2) lang.php, (3) client.php, and (4) server.php.
|
[] | null | null | null | null |
|
GHSA-qfmj-8v62-hh7x
|
Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.
|
[] | null | 7.1 | null | null |
|
GHSA-6v4j-2r9w-m853
|
Unspecified vulnerability in the Oracle Data Pump component in Oracle Database 11.1.0.7, 10.2.0.3, 10.2.0.4, 10.1.0.5, 9.2.0.8, and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
|
[] | null | null | null | null |
|
GHSA-778m-x5h7-mg59
|
Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118.
|
[] | null | 8.8 | null | null |
|
GHSA-hq74-wjjq-w2f3
|
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
|
[] | null | null | null | null |
|
RHBA-2023:2977
|
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
|
amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
CVE-2017-14637
|
In sam2p 0.49.3, there is an invalid read of size 2 in the parse_rgb function in in_xpm.cpp. However, this can also cause a write to an illegal address.
|
[
"cpe:2.3:a:sam2p_project:sam2p:0.49.3:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2022-25271
|
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
|
[
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 |
|
CVE-2023-41842
|
A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
|
[
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2017-9469
|
In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory. Thus, remote attackers might be able to cause a crash.
|
[
"cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-ghmj-crg5-xw2j
|
Improper Input Validation in yargs-parser
|
Duplicate of GHSA-p9pc-299p-vxgp
|
[] | null | 5.3 | null | null |
GHSA-h346-g45r-r5rw
|
IBM Db2 for Linux, UNIX and Windows 10.5, 11.1, and 11.5 is vulnerable to information Disclosure due to improper privilege management when a specially crafted table access is used. IBM X-Force ID: 241671.
|
[] | null | 7.5 | null | null |
|
GHSA-p7rp-jm7j-vvq5
|
Multiple cross-site scripting (XSS) vulnerabilities in Hummingbird CyberDOCS 3.5.1, 3.9, and 4.0 allow remote attackers to inject arbitrary web script or HTML via certain vectors.
|
[] | null | null | null | null |
|
CVE-2017-2426
|
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "iBooks" component. It allows remote attackers to obtain sensitive information from local files via a file: URL in an iBooks file.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4.3 |
|
CVE-2020-6828
|
A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution.<br> *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.7.
|
[
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 6.4 |
|
GHSA-6qgq-7mc3-cq6v
|
Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-2014-8456, CVE-2014-8458, CVE-2014-8459, CVE-2014-8461, and CVE-2014-9158.
|
[] | null | null | null | null |
|
RHSA-2010:0867
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-6f8h-jgv8-3rw6
|
FUEL CMS 1.4.3 has CSRF via users/create/ to add an administrator account.
|
[] | null | null | 8.8 | null |
|
CVE-2018-5160
|
WebRTC can use a "WrappedI420Buffer" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affects Firefox < 60.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-g9r9-qf5q-53xq
|
SQL injection vulnerability in the login directory in AlstraSoft Web Host Directory allows remote attackers to execute arbitrary SQL commands via the pwd parameter.
|
[] | null | null | null | null |
|
GHSA-2rvv-w9r2-rg7m
|
Information Disclosure in Apache Tomcat
|
When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
|
[] | null | 5.9 | null | null |
GHSA-wc9w-wvq2-ffm9
|
Server Side Request Forgery in Grafana
|
The avatar feature in Grafana (github.com/grafana/grafana/pkg/api/avatar) 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on.
|
[] | null | 5.8 | null | null |
PYSEC-2024-54
| null |
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint of `CodeChecker store` are not properly sanitized. An attacker, using a path traversal attack, can load and display files on the machine of `CodeChecker server`. The vulnerable endpoint is `/Default/v6.53/CodeCheckerService@massStoreRun`. The path traversal vulnerability allows reading data on the machine of the `CodeChecker server`, with the same permission level as the `CodeChecker server`.
The attack requires a user account on the `CodeChecker server`, with permission to store to a server, and view the stored report. This vulnerability has been patched in version 6.23.
|
[] | null | 6.5 | null | null |
CVE-2010-1312
|
Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
[
"cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ijoomla:com_news_portal:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ijoomla:com_news_portal:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ijoomla:com_news_portal:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ijoomla:com_news_portal:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-qjcg-h2hw-4c86
|
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
|
[] | null | null | null | null |
|
CVE-2022-2361
|
Social Chat < 6.0.5 - Admin+ Stored Cross-Site Scripting
|
The WP Social Chat WordPress plugin before 6.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks.
|
[
"cpe:2.3:a:quadlayers:wp_social_chat:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2016-4036
|
The quagga package before 0.99.23-2.6.1 in openSUSE and SUSE Linux Enterprise Server 11 SP 1 uses weak permissions for /etc/quagga, which allows local users to obtain sensitive information by reading files in the directory.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2019-7874
|
A cross-site request forgery vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can result in unintended deletion of user roles.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-31217
|
@strapi/plugin-upload has a Denial-of-Service via Improper Exception Handling
|
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
|
[
"cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2019-8175
|
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-v7m2-rcm9-7785
|
A Directory Traversal vulnerability exists in ATX miniCMTS200a Broadband Gateway through 2.0 and Pico CMTS through 2.0. Successful exploitation of this vulnerability would allow an unauthenticated attacker to retrieve administrator credentials by sending a malicious POST request.
|
[] | null | null | null | null |
|
GHSA-4mxh-xfwq-hpgj
|
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9663.
|
[] | null | null | null | null |
|
CVE-2022-49237
|
ath11k: add missing of_node_put() to avoid leak
|
In the Linux kernel, the following vulnerability has been resolved:
ath11k: add missing of_node_put() to avoid leak
The node pointer is returned by of_find_node_by_type()
or of_parse_phandle() with refcount incremented. Calling
of_node_put() to aovid the refcount leak.
|
[] | null | 5.5 | null | null |
RHSA-2020:1503
|
Red Hat Security Advisory: rh-git218-git security update
|
git: Crafted URL containing new lines can cause credential leak
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
CVE-2007-3511
|
The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-72q7-8432-wmmm
|
The Get Custom Field Values WordPress plugin before 4.0 allows users with a role as low as Contributor to access other posts metadata without validating the permissions. Eg. contributors can access admin posts metadata.
|
[] | null | null | null | null |
|
GHSA-753p-wrj5-g8fj
|
PQClean has a correctness error in HQC decapsulation
|
ImpactA correctness error has been identified in the reference implementation of the HQC key encapsulation mechanism. Due to an indexing error, part of the secret key is incorrectly treated as non-secret data. This results in an incorrect shared secret value being returned when the decapsulation function is called with a malformed ciphertext.No concrete attack exploiting the error has been identified at this point. However, the error involves mishandling of the secret key, and in principle this presents a security vulnerability.PatchesPQClean does not have a release process, as it is a collection of implementations. If you obtained a HQC implementation from PQClean, please update to a version that includes the fixes proposed in https://github.com/PQClean/PQClean/pull/578.Please also [refer to our security policy](https://github.com/PQClean/PQClean/blob/master/SECURITY.md).WorkaroundsManually patching is always possibleFurther detailsIn the 2023/04/30 version of the HQC specification and reference implementation, an extra field (sigma) was added to the secret key structure to enable implicit rejection of malformed ciphertexts. The logic to retrieve the public key from the secret key in the decapsulation function was not updated accordingly. As a result, sigma is treated as part of the public key. Later in the decapsulation call, a incorrectly constructed comparison check allows this error to go through undetected. Due to how these two bugs interfere with each other, the decapsulation function never uses sigma to perform implicit rejection; instead, it accepts malformed ciphertexts and returns shared secrets based on their decryptions.ReferencesThis issue was first reported in OQS https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-gpf4-vrrw-r8v7. The vulnerability was identified by Célian Glénaz and Dahmun Goudarzi (Quarkslab).
|
[] | null | null | null | null |
RHSA-2014:1998
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 8.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.