id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-qccm-jjr5-xp7j
|
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) version 8 does not properly sanitize a specially crafted web request to an affected Dynamics server, aka "Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability." This affects Microsoft Dynamics 365. This CVE ID is unique from CVE-2018-8605, CVE-2018-8606, CVE-2018-8608.
|
[] | null | null | 5.4 | null |
|
GHSA-66c8-867q-m2rx
|
Cross-site scripting (XSS) vulnerability in the Web console in IBM InfoSphere Information Server 8.1 before FP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2024-51583
|
WordPress Kento Ads Rotator plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in KentoThemes Kento Ads Rotator allows Stored XSS.This issue affects Kento Ads Rotator: from n/a through 1.3.
|
[
"cpe:2.3:a:pluginspoint:kento_ads_rotator:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2011-4951
|
Open redirect vulnerability in phpgwapi/ntlm/index.php in EGroupware Enterprise Line (EPL) before 11.1.20110804-1 and EGroupware Community Edition before 1.8.001.20110805 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter.
|
[
"cpe:2.3:a:egroupware:egroupware:*:-:community:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware_enterprise_line:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2015-5286
|
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9623.
|
[
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-82xh-jrvf-x5qc
|
A remote code execution vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.
|
[] | null | null | 7.5 | null |
|
GHSA-2q84-j32v-48rc
|
Cisco IOS 12.2 through 12.4, when certain PMTUD, SNAT, or window-size configurations are used, allows remote attackers to cause a denial of service (infinite loop, and device reload or hang) via a TCP segment with crafted options, aka Bug ID CSCsz75186.
|
[] | null | null | null | null |
|
CVE-2021-28167
|
In Eclipse Openj9 to version 0.25.0, usage of the jdk.internal.reflect.ConstantPool API causes the JVM in some cases to pre-resolve certain constant pool entries. This allows a user to call static methods or access static members without running the class initialization method, and may allow a user to observe uninitialized values.
|
[
"cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
CVE-2020-13770
|
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\NETWORK SERVICE’).
|
[
"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2014-7880
|
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote attackers to cause a denial of service via unspecified vectors.
|
[
"cpe:2.3:a:hp:tcp_ip_services_openvms:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2010-0341
|
SQL injection vulnerability in the BB Simple Jobs (bb_simplejobs) extension 0.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:typo3:bb_simplejobs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-77vr-pqgg-3qm9
|
The SUSE Audit Log Keeper daemon before 0.2.1-0.4.6.1 for SUSE Manager and Spacewalk uses world-readable permissions for /etc/auditlog-keeper.conf, which allows local users to obtain passwords by reading this file.
|
[] | null | null | null | null |
|
GHSA-j3fq-6cwx-wgx7
|
Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device.
|
[] | null | 7.5 | null | null |
|
CVE-2022-31511
|
The AFDudley/equanimity repository through 2014-04-23 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[
"cpe:2.3:a:equanimity_project:equanimity:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 |
|
CVE-2022-1134
|
Type confusion in V8 in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2021-2464
|
Vulnerability in Oracle Linux (component: OSwatcher). Supported versions that are affected are 7 and 8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Linux executes to compromise Oracle Linux. Successful attacks of this vulnerability can result in takeover of Oracle Linux. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:o:oracle:engineered_systems_utilities:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:engineered_systems_utilities:19c:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:engineered_systems_utilities:21c:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2025-6209
|
Arbitrary File Read through Path Traversal in run-llama/llama_index
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
|
[] | null | null | 7.5 | null |
GHSA-5m5p-qhgx-3w2c
|
BarracudaDrive Web Server before 3.8 allows remote attackers to read the source code for web scripts by appending a (1) + (plus), (2) . (dot), or (3) %80 and similar characters to the file name in the URL.
|
[] | null | null | null | null |
|
CVE-2018-13558
|
The mintToken function of a smart contract implementation for rhovit, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:rhovit_project:rhovit:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-rhqh-2j4p-8rfx
|
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
|
[] | null | null | 7.8 | null |
|
GHSA-cq5c-cr6p-vfwm
|
The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.
|
[] | null | null | null | null |
|
GHSA-fxg8-qjj9-r7g8
|
Netscape 7.x to 7.2, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
|
[] | null | null | null | null |
|
GHSA-gxc9-84jf-fxjh
|
SQL injection vulnerability in print.php in the myTopics module for XOOPS allows remote attackers to execute arbitrary SQL commands via the articleid parameter.
|
[] | null | null | null | null |
|
GHSA-fh3q-62x7-gr6v
|
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H).
|
[] | null | null | 6.8 | null |
|
CVE-2024-22052
|
A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack
|
[
"cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:lts:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r17:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r18:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-x68x-wjx6-mq7m
|
The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850.
|
[] | null | null | null | null |
|
GHSA-43qr-7pjx-rp3v
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FameThemes OnePress allows Stored XSS.This issue affects OnePress: from n/a through 2.3.8.
|
[] | null | 6.5 | null | null |
|
GHSA-prff-8p42-p3xp
|
Unknown vulnerability in Viewglob before 2.0.1, related to "a potential security issue with the Viewglob display and ssh X forwarding," has unknown impact.
|
[] | null | null | null | null |
|
GHSA-575w-rwc7-4259
|
OpenSAML 2.x before 2.2.1 and XMLTooling 1.x before 1.2.1, as used by Internet2 Shibboleth Service Provider 2.x before 2.2.1, do not follow the KeyDescriptor element's Use attribute, which allows remote attackers to use a certificate for both signing and encryption when it is designated for just one purpose, potentially weakening the intended security application of the certificate.
|
[] | null | null | null | null |
|
GHSA-h9v7-73gj-prww
|
Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.
|
[] | null | null | null | null |
|
GHSA-cxv9-h4hx-92c5
|
Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.
|
[] | null | 6.1 | null | null |
|
CVE-2024-28888
|
A use-after-free vulnerability exists in the way Foxit Reade 2024.1.0.23997 handles a checkbox field object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:2024.1.0.23997:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:2024.1.0.23997:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-q2f4-f68h-74m4
|
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) create context command DDI DxgkDdiCreateContext in which the product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array, which may lead to denial of service or escalation of privileges.
|
[] | null | null | 7.8 | null |
|
CVE-2022-42206
|
PHPGurukul Hospital Management System In PHP V 4.0 is vulnerable to Cross Site Scripting (XSS) via doctor/view-patient.php, admin/view-patient.php, and view-medhistory.php.
|
[
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
RHSA-2024:4420
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
qemu-kvm: 'qemu-img info' leads to host file read/write
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
CVE-2023-42810
|
systeminformation SSID Command Injection Vulnerability
|
systeminformation is a System Information Library for Node.JS. Versions 5.0.0 through 5.21.6 have a SSID Command Injection Vulnerability. The problem was fixed with a parameter check in version 5.21.7. As a workaround, check or sanitize parameter strings that are passed to `wifiConnections()`, `wifiNetworks()` (string only).
|
[
"cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null |
CVE-2024-10120
|
wfh45678 Radar upload unrestricted upload
|
A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability affects unknown code of the file /services/v1/common/upload. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:radar:radar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:riskengine:radar:*:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-w6rc-q387-vpgq
|
insecure temporary directory usage in passenger
|
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
|
[] | null | null | null | null |
CVE-2014-7255
|
Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent.
|
[
"cpe:2.3:o:iij:seil_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iij:seil_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iij:seil_x2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iij:seil_x2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iij:seil_x1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iij:seil_x1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iij:seil_x86_fuji_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2018-7943
|
There is an authentication bypass vulnerability in some Huawei servers. A remote attacker with low privilege may bypass the authentication by some special operations. Due to insufficient authentication, an attacker may exploit the vulnerability to get some sensitive information and high-level users' privilege.
|
[
"cpe:2.3:o:huawei:1288h_v5_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2288h_v5_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2488_v5_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v5_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121_v5_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch140_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch140_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch140l_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch140l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch220_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch220_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch222_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch222_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch242_v5_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch242_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh1288_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh1288_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh2288_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh2288_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh2288h_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh2288h_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh310_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh310_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh321_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh321_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh321_v5_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh321_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh620_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh620_v3:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-vgc6-qrrc-44jv
|
The cifs_create function in fs/cifs/dir.c in the Linux kernel 2.6.33.2 and earlier allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a NULL nameidata (aka nd) field in a POSIX file-creation request to a server that supports UNIX extensions.
|
[] | null | null | null | null |
|
CVE-2007-1532
|
The neighbor discovery implementation in Microsoft Windows Vista allows remote attackers to conduct a redirect attack by (1) responding to queries by sending spoofed Neighbor Advertisements or (2) blindly sending Neighbor Advertisements.
|
[
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-4p2r-xxqf-p9x8
|
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66658.
|
[] | null | null | 8.8 | null |
|
CVE-2022-41061
|
Microsoft Word Remote Code Execution Vulnerability
|
Microsoft Word Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2010-5051
|
Cross-site scripting (XSS) vulnerability in admin/core/admin_func.php in razorCMS 1.0 stable allows remote attackers to inject arbitrary web script or HTML via the content parameter in an edit action to admin/index.php.
|
[
"cpe:2.3:a:razorcms:razorcms:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-2426
|
FTPshell Server 3.38 allows remote authenticated users to cause a denial of service (application crash) by multiple connections and disconnections without using the QUIT command.
|
[
"cpe:2.3:a:ftpshell:ftpshell_server:3.38:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2009-2092
|
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.5 does not properly read the portletServingEnabled parameter in ibm-portlet-ext.xmi, which allows remote attackers to bypass intended access restrictions via unknown vectors.
|
[
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2013-4164
|
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
|
[
"cpe:2.3:a:ruby-lang:ruby:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-46936
|
net: fix use-after-free in tw_timer_handler
|
In the Linux kernel, the following vulnerability has been resolved:
net: fix use-after-free in tw_timer_handler
A real world panic issue was found as follow in Linux 5.4.
BUG: unable to handle page fault for address: ffffde49a863de28
PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0
RIP: 0010:tw_timer_handler+0x20/0x40
Call Trace:
<IRQ>
call_timer_fn+0x2b/0x120
run_timer_softirq+0x1ef/0x450
__do_softirq+0x10d/0x2b8
irq_exit+0xc7/0xd0
smp_apic_timer_interrupt+0x68/0x120
apic_timer_interrupt+0xf/0x20
This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.
The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net->mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.
This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.
Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.
[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
RHEA-2010:0272
|
Red Hat Enhancement Advisory: valgrind bug fix and enhancement update
|
valgrind: .valgrindrc loaded from untrusted locations
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:2130
|
Red Hat Security Advisory: emacs security update
|
emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
CVE-2014-3448
|
BSS Continuity CMS 4.2.22640.0 has a Remote Code Execution vulnerability due to unauthenticated file upload
|
[
"cpe:2.3:a:bss_continuity_cms_project:bss_continuty_cms:4.2.22640.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2006-2310
|
BlueDragon Server and Server JX 6.2.1.286 for Windows allows remote attackers to cause a denial of service (hang) via a request for a .cfm file whose name contains an MS-DOS device name such as (1) con, (2) aux, (3) com1, and (4) com2.
|
[
"cpe:2.3:a:new_atlanta_communications:bluedragon_server:6.2.1.286:*:windows:*:*:*:*:*",
"cpe:2.3:a:new_atlanta_communications:bluedragon_server_jx:6.2.1.286:*:windows:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5jj7-gjcq-hrc8
|
ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information.
|
[] | null | 5.3 | null | null |
|
GHSA-jf49-xxxc-fhh5
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Swift Calendar Online Appointment Scheduling allows Reflected XSS. This issue affects Swift Calendar Online Appointment Scheduling: from n/a through 1.3.3.
|
[] | null | 7.1 | null | null |
|
CVE-2022-28152
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.
|
[
"cpe:2.3:a:jenkins:job_and_node_ownership:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-2c6c-w342-prhc
|
The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.
|
[] | null | null | null | null |
|
GHSA-gqfg-mrjf-mwrx
|
Survey Sparrow Enterprise Survey Software 2022 has a Stored cross-site scripting (XSS) vulnerability in the Signup parameter.
|
[] | null | 5.4 | null | null |
|
GHSA-qjwq-pv5h-h78g
|
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 5.4 | null | null |
|
CVE-2020-21835
|
A null pointer deference issue exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2337.
|
[
"cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-27901
|
Directory Traversal vulnerability in SAP Asset Accounting
|
SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.
|
[
"cpe:2.3:a:sap:asset_accounting:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-w2qj-9cx6-95c6
|
Unspecified vulnerability in the dotoprocs function in Sun Solaris 10 allows local users to cause a denial of service (panic) via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2025-24836
|
Qardio Heart Health IOS and Android Application and QardioARM A100 Uncaught Exception
|
With a specially crafted Python script, an attacker could send
continuous startMeasurement commands over an unencrypted Bluetooth
connection to the affected device. This would prevent the device from
connecting to a clinician's app to take patient readings and ostensibly
flood it with requests, resulting in a denial-of-service condition.
|
[] | 6.1 | 7.1 | null | null |
GHSA-r3m4-wq9m-7fx4
|
In the Linux kernel, the following vulnerability has been resolved:MIPS: pgalloc: fix memory leak caused by pgd_free()pgd page is freed by generic implementation pgd_free() since commit
f9cb654cb550 ("asm-generic: pgalloc: provide generic pgd_free()"),
however, there are scenarios that the system uses more than one page as
the pgd table, in such cases the generic implementation pgd_free() won't
be applicable anymore. For example, when PAGE_SIZE_4KB is enabled and
MIPS_VA_BITS_48 is not enabled in a 64bit system, the macro "PGD_ORDER"
will be set as "1", which will cause allocating two pages as the pgd
table. Well, at the same time, the generic implementation pgd_free()
just free one pgd page, which will result in the memory leak.The memory leak can be easily detected by executing shell command:
"while true; do ls > /dev/null; grep MemFree /proc/meminfo; done"
|
[] | null | 5.5 | null | null |
|
CVE-2019-4265
|
IBM Maximo Anywhere 7.6.0, 7.6.1, 7.6.2, and 7.6.3 does not have device root detection which could result in an attacker gaining sensitive information about the device. IBM X-Force ID: 160198.
|
[
"cpe:2.3:a:ibm:maximo_anywhere:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_anywhere:7.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_anywhere:7.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_anywhere:7.6.3.0:*:*:*:*:*:*:*"
] | null | null | 2.4 | null |
|
CVE-2016-2884
|
Cross-site request forgery (CSRF) vulnerability in IBM Forms Experience Builder 8.5.x and 8.6.x before 8.6.3.1, in an unspecified non-default configuration, allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
|
[
"cpe:2.3:a:ibm:forms_experience_builder:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.3:*:*:*:*:*:*:*"
] | null | null | 8 | 6 |
|
CVE-2024-21006
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-h7jv-6rq7-jwqh
|
User enumeration vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow a remote user to retrieve all valid users registered in the application just by looking at the request response.
|
[] | null | 5.3 | null | null |
|
CVE-2020-13405
|
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
|
[
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-6v8r-893r-3f27
|
Cross Site Scripting vulnerability found in TeaCMS storage allows attacker to cause a leak of sensitive information via the article title parameter.
|
[] | null | 5.4 | null | null |
|
CVE-2019-2873
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 |
|
GHSA-vgm9-mx28-w88w
|
Unspecified vulnerability in RS Gallery2 (com_rsgallery2) 1.11.3 and earlier for Joomla! has unspecified impact and attack vectors, related to lack of "hardened language files."
|
[] | null | null | null | null |
|
GHSA-746h-9hhm-mgv6
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan allows Path Traversal. This issue affects Tainacan: from n/a through 0.21.14.
|
[] | null | 8.6 | null | null |
|
CVE-2024-23497
|
Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:ethernet_complete_driver_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:ethernet_800_series_controllers_driver:*:*:*:*:*:linux:*:*"
] | 9.3 | 8.8 | null | null |
|
GHSA-7vvx-296g-vp4g
|
Avantra Server 24.x before 24.0.7 and 24.1.x before 24.1.1 mishandles the security of dashboards, aka XAN-5367. If a user can create a dashboard with an auto-login user, data disclosure may occur. Access control can be bypassed when there is a shared dashboard, and its auto-login user has privileges that a dashboard visitor should not have.
|
[] | null | 6.8 | null | null |
|
CVE-2019-18987
|
An issue was discovered in the AbuseFilter extension through 1.34 for MediaWiki. Once a specific abuse filter has (accidentally or otherwise) been made public, its previous versions can be exposed, thus potentially disclosing private or sensitive information within the filter's definition.
|
[
"cpe:2.3:a:mediawiki:abusefilter:*:*:*:*:*:mediawiki:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-qq2x-j84f-pf8v
|
Opera allows web sites to set cookies for country-specific top-level domains that have DNS A records, such as co.tv, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session, aka "Cross-Site Cooking."
|
[] | null | null | null | null |
|
CVE-2022-38227
|
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.
|
[
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2020-16901
|
Windows Kernel Information Disclosure Vulnerability
|
<p>An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.</p>
<p>To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p>
<p>The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.</p>
|
[
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
GHSA-4r7j-x8fr-p2q2
|
In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112328051
|
[] | null | null | null | null |
|
GHSA-p7ww-6g8j-7w56
|
Sensitive information exposure in onCharacteristicRead in Charm by Samsung prior to version 1.2.3 allows attacker to get bluetooth connection information without permission.
|
[] | null | 3.3 | null | null |
|
GHSA-qr4p-ppj7-4xcx
|
Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | null | null |
|
CVE-2024-34934
|
A SQL injection vulnerability in /view/emarks_range_grade_update_form.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the conversation_id parameter.
|
[
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-2x6r-x73c-jxgw
|
Dell SmartFabric Storage Software v1.4 (and earlier) contains an OS Command Injection Vulnerability in the restricted shell in SSH. An authenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary commands.
|
[] | null | 7.8 | null | null |
|
CVE-2015-1121
|
WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
|
[
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-45825
|
Token in custom credentials object can leak through logs in ydb-go-sdk
|
ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state.
|
[
"cpe:2.3:a:ydb:ydb-go-sdk:*:*:*:*:*:go:*:*"
] | null | 5.5 | null | null |
CVE-2017-13133
|
In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*"
] | null | null | 6.5 | 7.1 |
|
GHSA-8gqj-226h-gm8r
|
Passport-wsfed-saml2 allows SAML Authentication Bypass via Attribute Smuggling
|
OverviewThis vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.Am I Affected?You are affected by this SAML Attribute Smuggling vulnerability if you are using `passport-wsfed-saml2` version 4.6.3 or below, specifically under the following conditions:The service provider is using `passport-wsfed-saml2`,A valid SAML Response signed by the Identity Provider can be obtainedFixUpgrade to v4.6.4 or greater.
|
[] | 8.6 | null | null | null |
CVE-2020-9077
|
HUAWEI P30 smart phones with versions earlier than 10.1.0.160(C00E160R2P11) have an information exposure vulnerability. The system does not properly authenticate the application that access a specified interface. Attackers can trick users into installing malicious software to exploit this vulnerability and obtain some information about the device. Successful exploit may cause information disclosure.
|
[
"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | 4.3 |
|
GHSA-4pwq-h255-q8fh
|
An issue was discovered on Samsung mobile devices with O(8.x) software. Attackers can bypass Factory Reset Protection (FRP) via an external keyboard. The Samsung ID is SVE-2019-15164 (October 2019).
|
[] | null | null | null | null |
|
CVE-2022-39160
|
IBM Cognos Analytics cross-site scripting
|
IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 235064.
|
[
"cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack5:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2018-3574
|
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, userspace can request ION cache maintenance on a secure ION buffer for which the ION_FLAG_SECURE ion flag is not set and cause the kernel to attempt to perform cache maintenance on memory which does not belong to HLOS.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2020-7583
|
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0.8). The application does not properly validate the users' privileges when executing some operations, which could allow a user with low permissions to arbitrary modify files that should be protected against writing.
|
[
"cpe:2.3:a:siemens:automation_license_manager:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2004-2361
|
Digital Reality game engine, as used in Haegemonia 1.0 through 1.0.7 and Desert Rats vs. Afrika Korps 1.0, allows remote attackers to cause a denial of service (crash) via a chat message with a large message size, which triggers an out-of-bounds read.
|
[
"cpe:2.3:a:digital_reality:desert_rats_vs._afrika_korps:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digital_reality:haegemonia:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digital_reality:haegemonia:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digital_reality:haegemonia:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digital_reality:haegemonia:1.0.7:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vcwq-r4jx-9c44
|
Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7 | null | null |
|
CVE-2024-57430
|
An SQL injection vulnerability in the pjActionGetUser function of PHPJabbers Cinema Booking System v2.0 allows attackers to manipulate database queries via the column parameter. Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation.
|
[] | null | 9.8 | null | null |
|
GHSA-33f9-4h6q-m86q
|
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSOAR before 7.2.1 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP GET requests.
|
[] | null | 7.2 | null | null |
|
GHSA-f267-x8wv-jgfj
|
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the event_id parameter at /php-jms/result_sheet.php.
|
[] | null | 9.8 | null | null |
|
CVE-2024-50375
|
A CWE-306 "Missing Authentication for Critical Function" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point.
|
[
"cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-88hc-87fj-j5x4
|
An issue was discovered in Ricoh (including Savin and Lanier) Windows printer drivers prior to 2020 that allows attackers local privilege escalation. Affected drivers and versions are: PCL6 Driver for Universal Print - Version 4.0 or later PS Driver for Universal Print - Version 4.0 or later PC FAX Generic Driver - All versions Generic PCL5 Driver - All versions RPCS Driver - All versions PostScript3 Driver - All versions PCL6 (PCL XL) Driver - All versions RPCS Raster Driver - All version
|
[] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.