id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7952-5h7p-gw4m
|
Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.
|
[] | null | 9.8 | null | null |
|
GHSA-9ggq-g75c-f8wx
|
On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.
|
[] | null | null | 9.8 | null |
|
GHSA-32cj-5wx4-gq8p
|
HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims
|
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9
|
[] | 2 | 2.6 | null | null |
GHSA-659x-8694-84c2
|
An elevation of privilege vulnerability in Smart Lock could enable a local malicious user to access Smart Lock settings without a PIN. This issue is rated as Moderate because it first requires physical access to an unlocked device where Smart Lock was the last settings pane accessed by the user. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1. Android ID: A-29055171.
|
[] | null | null | 4.6 | null |
|
GHSA-q86f-vpr4-qh74
|
Integer overflow in the Region::unflatten function in libs/ui/Region.cpp in mediaserver in Android 6.x before 2016-09-01 and 7.0 before 2016-09-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 29983260.
|
[] | null | null | 5.5 | null |
|
CVE-2016-2948
|
IBM BigFix Remote Control before 9.1.3 allows local users to discover hardcoded credentials via unspecified vectors.
|
[
"cpe:2.3:a:ibm:bigfix_remote_control:9.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-5gvm-v5f4-x692
|
A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.
|
[] | null | 6.5 | null | null |
|
CVE-2017-0723
|
A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37968755.
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2019-12655
|
Cisco IOS XE Software FTP Application Layer Gateway for NAT, NAT64, and ZBFW Denial of Service Vulnerability
|
A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a buffer overflow that occurs when an affected device inspects certain FTP traffic. An attacker could exploit this vulnerability by performing a specific FTP transfer through the device. A successful exploit could allow the attacker to cause the device to reload.
|
[
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:16.9.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
CVE-2018-11913
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper configuration of dev nodes may lead to potential security issue.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-qf78-7rgr-8jf5
|
A vulnerability classified as problematic was found in Ziftr primecoin up to 0.8.4rc1. Affected by this vulnerability is the function HTTPAuthorized of the file src/bitcoinrpc.cpp. The manipulation of the argument strUserPass/strRPCUserColonPass leads to observable timing discrepancy. Upgrading to version 0.8.4rc2 is able to address this issue. The name of the patch is cdb3441b5cd2c1bae49fae671dc4a496f7c96322. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217171.
|
[] | null | 7.5 | null | null |
|
CVE-2020-4827
|
IBM API Connect 10.0.0.0 through 10.0.1.0 and 2018.4.1.0 through 2018.4.1.13 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 189841.
|
[
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_connect:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_connect:10.0.1.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2025-2239
|
Absolute Path Disclosure Vulnerability in Hillstone Next Generation FireWall
|
Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23.
|
[] | null | 5.3 | null | null |
PYSEC-2023-78
| null |
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8.
|
[] | null | null | null | null |
GHSA-fwgm-gxhm-fgf8
|
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.
|
[] | null | null | null | null |
|
CVE-2025-27145
|
copyparty renders unsanitized filenames as HTML when user uploads empty files
|
copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into copyparty's Web-UI, an attacker could execute arbitrary javascript with the same privileges as that user. For example, this could give unintended read-access to files owned by that user. The bug is triggered by the drag-drop action itself; it is not necessary to actually initiate the upload. The file must be empty (zero bytes). Note that, as a general-purpose webserver, it is intentionally possible to upload HTML-files with arbitrary javascript in `<script>` tags, which will execute when the file is opened. The difference is that this vulnerability would trigger execution of javascript during the act of uploading, and not when the uploaded file was opened. Version 1.16.15 contains a fix.
|
[] | null | 3.6 | null | null |
CVE-2016-9167
|
NDSD in Novell eDirectory before 9.0.2 did not calculate ACLs on LDAP objects across partition boundaries correctly, which could lead to a privilege escalation by modifying user attributes that would otherwise be filtered by an ACL.
|
[
"cpe:2.3:a:novell:edirectory:*:hotfix2:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-wvrr-f44c-x28v
|
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896.
|
[] | null | 7.5 | null | null |
|
GHSA-vj7g-5fj3-rc83
|
User enumeration can occur in the Authentication REST API in Delinea PAM Secret Server 11.4. This allows a remote attacker to determine whether a user is valid because of a difference in responses from the /oauth2/token endpoint.
|
[] | null | 5.3 | null | null |
|
CVE-2014-4279
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 allows remote authenticated users to affect integrity via vectors related to PIA Core Technology.
|
[
"cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
RHSA-2022:8979
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | 6.1 | null |
GHSA-jpm3-6rm2-fhgg
|
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition.
|
[] | null | null | 6.5 | null |
|
GHSA-x5xm-f46c-5cpq
|
The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <transport-config confidentiality="required" trust-in-target="supported"/>
|
[] | null | null | 5.9 | null |
|
GHSA-w9qh-f4fr-cg94
|
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41344.
|
[] | null | 8.1 | null | null |
|
CVE-2022-4754
|
Easy Social Box <= 4.1.2 - Contributor+ Stored XSS via Shortcode
|
The Easy Social Box / Page Plugin WordPress plugin through 4.1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[
"cpe:2.3:a:easy_social_box_project:easy_social_box:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-xxq2-62cv-vmcw
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in psicosi448 wp2syslog plugin <= 1.0.5 versions.
|
[] | null | 5.9 | null | null |
|
CVE-2022-31022
|
Missing Role Based Access Control for the REST handlers in bleve/http package
|
Bleve is a text indexing library for go. Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. These HTTP methods pave way for exploitation of a node’s filesystem where the bleve index resides, if the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. For instance, the CreateIndexHandler (`http/index_create.go`) and DeleteIndexHandler (`http/index_delete.go`) enable an attacker to create a bleve index (directory structure) anywhere where the user running the server has the write permissions and to delete recursively any directory owned by the same user account. Users who have used the bleve/http package for exposing access to bleve index without the explicit
handling for the Role Based Access Controls(RBAC) of the index assets would be impacted by this issue. Version 2.5.0 relocated the `http/` dir used _only_ by bleve-explorer to `blevesearch/bleve-explorer`, thereby addressing the issue. However, the http package is purely intended to be used for demonstration purposes. Bleve was never designed handle the RBACs, nor it was ever advertised to be used in that way. The collaborators of this project have decided to stay away from adding any authentication or authorization to bleve project at the moment. The bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user inputs as well as any authentication and authorization measures. It is recommended to not use bleve/http in production use cases.
|
[
"cpe:2.3:a:couchbase:bleve:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
GHSA-684j-qvrf-6fvq
|
Multiple SQL injection vulnerabilities in aWebBB 1.2 allow remote attackers to execute arbitrary SQL commands via the (1) Username parameter to (a) accounts.php, (b) changep.php, (c) editac.php, (d) feedback.php, (e) fpass.php, (f) login.php, (g) post.php, (h) reply.php, or (i) reply_log.php; (2) p parameter to (j) dpost.php; (3) c parameter to (k) list.php or (l) ndis.php; or (12) q parameter to (m) search.php.
|
[] | null | null | null | null |
|
CVE-2024-41932
|
sched: fix warning in sched_setaffinity
|
In the Linux kernel, the following vulnerability has been resolved:
sched: fix warning in sched_setaffinity
Commit 8f9ea86fdf99b added some logic to sched_setaffinity that included
a WARN when a per-task affinity assignment races with a cpuset update.
Specifically, we can have a race where a cpuset update results in the
task affinity no longer being a subset of the cpuset. That's fine; we
have a fallback to instead use the cpuset mask. However, we have a WARN
set up that will trigger if the cpuset mask has no overlap at all with
the requested task affinity. This shouldn't be a warning condition; its
trivial to create this condition.
Reproduced the warning by the following setup:
- $PID inside a cpuset cgroup
- another thread repeatedly switching the cpuset cpus from 1-2 to just 1
- another thread repeatedly setting the $PID affinity (via taskset) to 2
|
[] | null | null | null | null |
RHSA-2020:5235
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
GHSA-23f2-6pcg-vrwj
|
SQL injection vulnerability in logon.jsp in Ad Server Solutions Affiliate Software Java 4.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password, possibly related to the uname and pass parameters to logon_process.jsp. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null |
|
CVE-2024-39133
|
Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows attackers to cause a denial of service via the __zzip_parse_root_directory() function at /zzip/zip.c.
|
[
"cpe:2.3:a:zziplib_project:zziplib:0.13.77:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2025-2716
|
China Mobile P22g-CIac Samba Path path traversal
|
A vulnerability classified as problematic was found in China Mobile P22g-CIac 1.0.00.488. This vulnerability affects unknown code of the component Samba Path Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 2.7 | 2.7 | 3.3 |
CVE-2022-33270
|
Time-of-check time-of-use race condition in Modem
|
Transient DOS due to time-of-check time-of-use race condition in Modem while processing RRC Reconfiguration message.
|
[
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4350-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4350-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325-af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325-af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2023-35387
|
Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
|
Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-gvmx-6cqv-6x5q
|
An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have backend validation for the current password and doesn't require any type of authentication. By making a POST request to the apply.cgi file of the router, the attacker can change the admin username and password of the router.
|
[] | null | null | 9.8 | null |
|
CVE-2023-21053
|
In sms_ExtractCbLanguage of sms_CellBroadcast.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-251805610References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
ICSA-13-347-01
|
Siemens COMOS Privilege Escalation
|
Siemens COMOS before 9.2.0.8.1, 10.0 before 10.0.3.1.40, and 10.1 before 10.1.0.0.2 allows local users to gain database privileges via unspecified vectors.
|
[] | null | null | null | null |
CVE-2014-7040
|
The UniCredit Investors (aka eu.unicreditgroup.brand.ucinvestors) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:unicreditgroup:unicredit_investors:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2019-19550
|
Remote Authentication Bypass in Senior Rubiweb 6.2.34.28 and 6.2.34.37 allows admin access to sensitive information of affected users using vulnerable versions. The attacker only needs to provide the correct URL.
|
[
"cpe:2.3:a:senior:rubiweb:6.2.34.28:*:*:*:*:*:*:*",
"cpe:2.3:a:senior:rubiweb:6.2.34.37:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-9c9v-3gvm-26m7
|
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation, as demonstrated by forms in server/google-tools/ and certain other files.
|
[] | null | null | null | null |
|
GHSA-hfv9-qvw2-c8h9
|
SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the Computer Location parameter in manage-computer.php page.
|
[] | null | 9.8 | null | null |
|
GHSA-r863-p739-275c
|
Malicious Package in reuest
|
All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
|
[] | null | 9.8 | null | null |
CVE-2025-7889
|
CallApp Caller ID App caller.id.phone.number.block AndroidManifest.xml improper export of android application components
|
A vulnerability was found in CallApp Caller ID App up to 2.0.4 on Android. It has been classified as problematic. Affected is an unknown function of the file AndroidManifest.xml of the component caller.id.phone.number.block. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8 | 5.3 | 5.3 | 4.3 |
CVE-2021-22522
|
Reflected Cross-Site Scripting vulnerability in Micro Focus Verastream Host Integrator, affecting version version 7.8 Update 1 and earlier versions. The vulnerability could allow disclosure of confidential data.
|
[
"cpe:2.3:a:microfocus:verastream_host_integrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:verastream_host_integrator:7.8:-:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:verastream_host_integrator:7.8:update_1:*:*:*:*:*:*"
] | null | 7.1 | null | 6.8 |
|
GHSA-r25p-2jw3-4qp2
|
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Recommendations plugin <= 2.3.0 versions.
|
[] | null | 8.8 | null | null |
|
CVE-2019-19777
|
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
|
[
"cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nothings:stb_image.h:2.23:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2007-3622
|
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
|
[
"cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-c87j-9rrq-h3j8
|
Moodle allows attackers to trigger the generation of arbitrary messages
|
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
|
[] | null | null | null | null |
GHSA-g86j-gmgg-2qh2
|
There is a Permission Management and Access Control vulnerability in the GoldenDB database product. Attackers can manipulate requests to bypass privilege restrictions and delete content.
|
[] | null | 5.4 | null | null |
|
GHSA-mjmh-8xw4-7gg7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog Plugin for WordPress plugin <= 3.3.26 versions.
|
[] | null | 6.5 | null | null |
|
GHSA-qff5-gg8v-99hv
|
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-feeds/add.
|
[] | null | 6.1 | null | null |
|
CVE-2024-50597
|
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
|
[] | null | 4.3 | null | null |
|
GHSA-cx8w-wqgc-mpmh
|
Cross-site scripting (XSS) vulnerability in repository/lib.php in Moodle 2.1.x before 2.1.7 and 2.2.x before 2.2.4 allows remote authenticated administrators to inject arbitrary web script or HTML by renaming a repository.
|
[] | null | null | null | null |
|
GHSA-79vf-hf9f-j9q8
|
@vue/cli-plugin-pwa Regular Expression Denial of Service vulnerability
|
A vulnerability was found in vuejs vue-cli up to 5.0.8. It has been rated as problematic. This issue affects the function HtmlPwaPlugin of the file packages/@vue/cli-plugin-pwa/lib/HtmlPwaPlugin.js of the component Markdown Code Handler. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely.
|
[] | 5.3 | 4.3 | null | null |
GHSA-66gv-5m8q-rrjc
|
jsonij vulnerable to stack exhaustion
|
An issue was discovered jmarsden/jsonij through 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
|
[] | null | 7.5 | null | null |
CVE-2021-27240
|
This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009.
|
[
"cpe:2.3:a:solarwinds:patch_manager:2020.2.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-c5g4-f3c5-3jpf
|
AppCMS 2.0.101 in /admin/download_frame.php has a SQL injection vulnerability which allows attackers to obtain sensitive database information.
|
[] | null | null | null | null |
|
CVE-2020-4067
|
Improper Initialization in coturn
|
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
|
[
"cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 7 | null | null |
ICSA-18-107-01
|
Schneider Electric InduSoft Web Studio and InTouch Machine Edition
|
A remote attacker could send a carefully crafted packet during a tag, alarm, or event related action such as read and write, which may allow remote code execution.CVE-2018-8840 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null |
CVE-2022-25495
|
The component /jquery_file_upload/server/php/index.php of CuppaCMS v1.0 allows attackers to upload arbitrary files and execute arbitrary code via a crafted PHP file.
|
[
"cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2017-11033
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the coresight-tmc driver, a simultaneous read and enable of the ETR device after changing the buffer size may result in a Use After Free condition of the previous buffer.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2020-27774
|
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | 4.3 |
|
CVE-2022-25293
|
A systemd stack-based buffer overflow in WatchGuard Firebox and XTM appliances allows an authenticated remote attacker to potentially execute arbitrary code by initiating a firmware update with a malicious upgrade image. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
|
[
"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:-:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u1:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u2:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u3:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u4:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u5:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u6:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.1.3:u7:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.5.9:-:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.5.9:u1:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.7.2:-:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:12.7.2:u1:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2016-10926
|
The nelio-ab-testing plugin before 4.5.9 for WordPress has SSRF in ajax/iesupport.php.
|
[
"cpe:2.3:a:neliosoftware:nelio_ab_testing:*:*:*:*:*:wordpress:*:*"
] | null | null | 10 | 6.4 |
|
GHSA-mh49-xg6j-w6xh
|
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X1800GS-B v1.17 and earlier, WRC-X1800GSA-B v1.17 and earlier, WRC-X1800GSH-B v1.17 and earlier, WRC-X6000XS-G v1.09, and WRC-X6000XST-G v1.12 and earlier.
|
[] | null | 6.8 | null | null |
|
CVE-2016-8636
|
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-r2jx-m375-vp2w
|
registroTL stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for /usuarios.dat.
|
[] | null | null | null | null |
|
GHSA-j288-cwf6-9mv5
|
Intel Compute in Apple OS X before 10.9.4 does not properly restrict an unspecified OpenCL API call, which allows attackers to execute arbitrary code via a crafted application.
|
[] | null | null | null | null |
|
GHSA-vm9f-j47q-jhg5
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in UusWeb.Ee WS Contact Form allows Stored XSS.This issue affects WS Contact Form: from n/a through 1.3.7.
|
[] | null | 5.9 | null | null |
|
CVE-2006-1577
|
Multiple cross-site scripting (XSS) vulnerabilities in view_all_set.php in Mantis 1.0.1, 1.0.0rc5, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) start_day, (2) start_year, and (3) start_month parameters.
|
[
"cpe:2.3:a:mantis:mantis:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2025:9569
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: GIMP ICO File Parsing Integer Overflow gimp: Multiple heap buffer overflows in TGA parser gimp: Multiple use after free in XCF parser
|
[
"cpe:/a:redhat:rhel_e4s:8.8::appstream",
"cpe:/a:redhat:rhel_tus:8.8::appstream"
] | null | 7.3 | null | null |
CVE-2020-29481
|
An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 8.8 | null | 4.6 |
|
CVE-2008-2835
|
SQL injection vulnerability in cgi-bin/igsuite in IGSuite 3.2.4 allows remote attackers to execute arbitrary SQL commands via the formid parameter.
|
[
"cpe:2.3:a:igsuite:igsuite:3.2.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-5864
|
SQL injection vulnerability in the Top Hotel (com_tophotelmodule) component 1.0 in the Hotel Booking Reservation System (aka HBS) 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a showhoteldetails action to index.php.
|
[
"cpe:2.3:a:joomlahbs:com_tophotelmodule:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomlahbs:hotel_booking_reservation_system:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-14680
|
The admin-renamer-extended (aka Admin renamer extended) plugin 3.2.1 for WordPress allows wp-admin/plugins.php?page=admin-renamer-extended/admin.php CSRF.
|
[
"cpe:2.3:a:mijnpress:admin-renamer-extended:3.2.1:*:*:*:*:wordpress:*:*"
] | null | 5.7 | null | 3.5 |
|
CVE-2024-33121
|
Roothub v2.6 was discovered to contain a SQL injection vulnerability via the 's' parameter in the search() function.
|
[
"cpe:2.3:a:roothub:roothub:2.6.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
RHSA-2016:1051
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length()
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
GHSA-fw9m-8rv8-x2vp
|
SQL injection vulnerability in search.asp in CreaScripts Creadirectory allows remote attackers to execute arbitrary SQL commands via the category parameter.
|
[] | null | null | null | null |
|
GHSA-qx32-c2q2-cgcr
|
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
|
[] | null | null | null | null |
|
CVE-2018-18447
|
dotPDN Paint.NET before 4.1.2 allows Deserialization of Untrusted Data (issue 2 of 2).
|
[
"cpe:2.3:a:dotpdn:paint.net:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2021-46609
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15403.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-vmrj-vq2q-4f66
|
Multiple versions of GlobalProtect-openconnect are affected by incorrect access control in GPService through DBUS, GUI Application. The way GlobalProtect-Openconnect is set up enables arbitrary users to execute commands as root by submitting the `--script=<script>` parameter.
|
[] | null | 9.8 | null | null |
|
CVE-2018-20000
|
Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
|
[
"cpe:2.3:a:apereo:bw-webdav:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2025-31694
|
Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2025-023
|
Incorrect Authorization vulnerability in Drupal Two-factor Authentication (TFA) allows Forceful Browsing.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.10.0.
|
[] | null | 8.1 | null | null |
GHSA-6mw8-979h-4g47
|
A vulnerability, which was classified as critical, was found in Surya2Developer Hostel Management System 1.0. Affected is an unknown function of the file /admin/manage-students.php. The manipulation of the argument del leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-256890 is the identifier assigned to this vulnerability.
|
[] | null | 6.5 | null | null |
|
CVE-2007-2081
|
MyBlog 0.9.8 and earlier allows remote attackers to bypass authentication requirements via the admin cookie parameter to certain admin files, as demonstrated by admin/settings.php.
|
[
"cpe:2.3:a:myblog:myblog:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2014:0223
|
Red Hat Security Advisory: libtiff security update
|
(tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip() (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution (gif2tiff): GIF LZW decoder missing datasize value check (tiff2pdf): use-after-free in t2p_readwrite_pdf_image() (gif2tiff): possible heap-based buffer overflow in readgifimage() (gif2tiff): OOB Write in LZW decompressor
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2007-0494
|
ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.
|
[
"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-m4r8-j5xq-9jf3
|
Multiple cross-site scripting (XSS) vulnerabilities in IBM WebSphere Service Registry and Repository (WSRR) 6.3.x before 6.3.0.5, 7.0.x through 7.0.0.5, 7.5.x before 7.5.0.3, and 8.0.x before 8.0.0.2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null |
|
GHSA-76q4-85fh-5fj7
|
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12178)
|
[] | null | null | null | null |
|
GHSA-vmr8-6pr2-r534
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm rebootCommit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed
serdev") will cause below regression issue:BT can't be enabled after below steps:
cold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure
if property enable-gpios is not configured within DT|ACPI for QCA6390.The commit is to fix a use-after-free issue within qca_serdev_shutdown()
by adding condition to avoid the serdev is flushed or wrote after closed
but also introduces this regression issue regarding above steps since the
VSC is not sent to reset controller during warm reboot.Fixed by sending the VSC to reset controller within qca_serdev_shutdown()
once BT was ever enabled, and the use-after-free issue is also fixed by
this change since the serdev is still opened before it is flushed or wrote.Verified by the reported machine Dell XPS 13 9310 laptop over below two
kernel commits:
commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of bluetooth-next tree.
commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of linus mainline tree.
|
[] | null | 5.5 | null | null |
|
CVE-2024-25924
|
WordPress WP Testimonials plugin <= 1.4.3 - Auth. SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Trustindex.Io WP Testimonials.This issue affects WP Testimonials: from n/a through 1.4.3.
|
[] | null | 7.6 | null | null |
CVE-2017-3743
|
If multiple users are concurrently logged into a single system where one user is sending a command via the Lenovo ToolsCenter Advanced Settings Utility (ASU), UpdateXpress System Pack Installer (UXSPI) or Dynamic System Analysis (DSA) to a second machine, the other users may be able to see the user ID and clear text password that were used to access the second machine during the time the command is processing.
|
[
"cpe:2.3:a:lenovo:advanced_settings_utility:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lenovo:toolscenter_dynamic_system_analysis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lenovo:updatexpress_system_pack_installer:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 3.5 |
|
GHSA-5xpc-c4xv-7w62
|
Path traversal vulnerability in Jenkins PWauth Security Realm Plugin
|
Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
|
[] | null | 4.3 | null | null |
RHSA-2017:0933
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Null pointer dereference via keyctl kernel: Signed overflow for SO_{SND|RCV}BUFFORCE kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate) kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
CVE-2007-2125
|
Unspecified vulnerability in Collaborative Workspace in Oracle Collaboration Suite 10.1.2 has unknown impact and attack vectors, aka OCS01.
|
[
"cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-mm4c-ggh7-6cw3
|
Heap-based buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted album cover art in the covr atom of an MP4/AAC file.
|
[] | null | null | null | null |
|
GHSA-5wvm-65wc-c495
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | null | null |
|
CVE-2009-4903
|
Cross-site scripting (XSS) vulnerability in index.php in oBlog allows remote attackers to inject arbitrary web script or HTML via the search parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:dootzky:oblog:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.