id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-1638
|
Alloggio Membership <= 1.1 - Authentication Bypass via Social Login Account Takeover
|
The Alloggio Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity through the alloggio_membership_init_rest_api_facebook_login and alloggio_membership_init_rest_api_google_login functions. This makes it possible for unauthenticated attackers to log in as any user, including administrators, without knowing a password.
|
[] | null | 9.8 | null | null | null |
GHSA-82qh-f392-6468
|
An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. Telecom has a System Crash via abnormal exception handling. The Samsung ID is SVE-2017-10906 (January 2018).
|
[] | null | null | null | null | null |
|
GHSA-pmjq-38q6-fxx9
|
An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 before 17.11.4 and 18.0 before 18.0.2. A missing authorization check may have allowed compliance frameworks to be applied to projects outside the compliance framework's group.
|
[] | null | 8.5 | null | null | null |
|
CVE-2024-35558
|
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/ca_deal.php?mudi=rev&nohrefStr=close.
|
[
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2015-6576
|
Bamboo 2.2 before 5.8.5 and 5.9.x before 5.9.7 allows remote attackers with access to the Bamboo web interface to execute arbitrary Java code via an unspecified resource.
|
[
"cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-926q-c6xf-358g
|
A vulnerability has been found in Campcodes Online Examination System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file selExamAttemptExe.php. The manipulation of the argument thisId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264451.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2008-1694
|
vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[
"cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:sccs:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-gh6q-p7qv-wv6v
|
The CRM Perks – WordPress HelpDesk Integration – Zendesk, Freshdesk, HelpScout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'crm-perks-tickets' shortcode in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2017-12869
|
The multiauth module in SimpleSAMLphp 1.14.13 and earlier allows remote attackers to bypass authentication context restrictions and use an authentication source defined in config/authsources.php via vectors related to improper validation of user input.
|
[
"cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-57634
|
An issue in the exp_copy component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[] | null | 7.5 | null | null | null |
|
GHSA-vprr-8w4v-cwhx
|
The Custom TinyMCE Shortcode Button WordPress plugin through 1.1 does not sanitise and escape the PHP_SELF variable before outputting it back in an attribute in an admin page, leading to Reflected Cross-Site Scripting.
|
[] | null | 6.1 | null | null | null |
|
GHSA-3483-88xw-5g3h
|
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
|
[] | null | 3.3 | null | null | null |
|
CVE-2002-1792
|
Buffer overflow in Fake Identd 0.9 through 1.4 allows remote attackers to execute arbitrary code as root via a long request that is split into multiple packets.
|
[
"cpe:2.3:a:fake_identd:fake_identd:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fake_identd:fake_identd:0.9b:*:*:*:*:*:*:*",
"cpe:2.3:a:fake_identd:fake_identd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fake_identd:fake_identd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fake_identd:fake_identd:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fake_identd:fake_identd:1.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-45361
|
An issue was discovered in VectorComponentUserLinks.php in the Vector Skin component in MediaWiki before 1.39.5 and 1.40.x before 1.40.1. vector-intro-page MalformedTitleException is uncaught if it is not a valid title, leading to incorrect web pages.
|
[
"cpe:2.3:a:mediawiki:mediawiki:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2024-48996
|
SQL Server Native Client Remote Code Execution Vulnerability
|
SQL Server Native Client Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null | null |
GHSA-2g4h-jr8q-95q6
|
The Quick License Manager – WooCommerce Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'submit_qlm_products' parameter in all versions up to, and including, 2.4.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
GHSA-wc9x-r2g7-vjwr
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch MailMunch – Grow your Email List allows Stored XSS.This issue affects MailMunch – Grow your Email List: from n/a through 3.1.6.
|
[] | null | 6.5 | null | null | null |
|
GHSA-m9h2-j85p-w95r
|
Crob FTP daemon 3.5.2 allows remote attackers to cause a denial of service (crash) by repeatedly connecting to and disconnecting from the server.
|
[] | null | null | null | null | null |
|
GHSA-234w-59xq-xhfv
|
An issue was discovered in Joomla! before 3.9.16. Missing length checks in the user table can lead to the creation of users with duplicate usernames and/or email addresses.
|
[] | null | null | null | null | null |
|
CVE-2019-5442
|
XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system.
|
[
"cpe:2.3:a:pippo:pippo:1.12.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-25596
|
WordPress Doofinder for WooCommerce plugin <= 2.1.8 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder for WooCommerce allows Stored XSS.This issue affects Doofinder for WooCommerce: from n/a through 2.1.8.
|
[] | null | 5.9 | null | null | null |
CVE-2022-35976
|
Improper KubeConfig handling allows arbitrary code execution
|
The GitOps Tools Extension for VSCode relies on kubeconfigs in order to communicate with Kubernetes clusters. A specially crafted kubeconfig leads to arbitrary code execution on behalf of the user running VSCode. Users relying on kubeconfigs that are generated or altered by other processes or users are affected by this issue. Please note that the vulnerability is specific to this extension, and the same kubeconfig would not result in arbitrary code execution when used with kubectl. Using only trust-worthy kubeconfigs is a safe mitigation. However, updating to the latest version of the extension is still highly recommended.
|
[
"cpe:2.3:a:weave:gitops_tools:*:*:*:*:*:visual_studio_code:*:*"
] | null | 5.2 | null | null | null |
RHSA-2017:1791
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) JDK: unspecified vulnerability fixed in 7u151 and 8u141 (JavaFX) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) JDK: unspecified vulnerability fixed in 7u151 and 8u141 (JavaFX) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: ECDSA implementation timing attack (JCE, 8175110) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: incorrect handling of certain EC points (Security, 8178135) OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.5 | null | null |
CVE-2021-38382
|
Live555 through 1.08 does not handle Matroska and Ogg files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash.
|
[
"cpe:2.3:a:live555:live555:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2010-2177
|
Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
|
[
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-rgfj-62rr-5vf5
|
x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-44807
|
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the cancelPing function.
|
[
"cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-820l_firmware:1.05b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-hw25-ffp2-52rq
|
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2012-4895
|
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.
|
[
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2015-2542
|
Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-6rpv-x4qm-m5rx
|
A security issue in the firmware image verification implementationat Supermicro MBD-X12DPG-OA6. An attacker can upload a specially crafted image that will cause a stack overflow is caused by not checking fld->used_bytes.
|
[] | null | 7.2 | null | null | null |
|
GHSA-c8wx-w8rj-chvm
|
The default configuration of the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not require authentication for sensitive configuration pages, which allows remote attackers to modify configuration.
|
[] | null | null | null | null | null |
|
GHSA-w5mq-x5jp-j4pg
|
Microsoft Internet Explorer 6.0 and earlier allows local users to cause a denial of service via an infinite loop for modeless dialogs showModelessDialog, which causes CPU usage while the focus for the dialog is not released.
|
[] | null | null | null | null | null |
|
CVE-2018-1771
|
IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687.
|
[
"cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:if2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:if3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:if4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.10:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.10:if2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.10:if3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.10:if4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.0.0:if2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.0.0:if3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.0.0:if4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.1.10:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.1.10:if2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.1.10:if3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.1.10:if4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:notes:9.0.1.10:if5:*:*:*:*:*:*"
] | null | null | 8.4 | null | null |
|
GHSA-fwjm-rf5j-rgrf
|
Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[] | null | null | 7.8 | null | null |
|
CVE-2021-31783
|
show_default.php in the LocalFilesEditor extension before 11.4.0.1 for Piwigo allows Local File Inclusion because the file parameter is not validated with a proper regular-expression check.
|
[
"cpe:2.3:a:piwigo:localfiles_editor:*:*:*:*:*:piwigo:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2021-33851
|
A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Custom logo link" executes whenever the user opens the Settings Page of the "Customize Login Image" Plugin.
|
[
"cpe:2.3:a:apasionados:customize_login_image:3.4:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-m2c3-39pw-7fwx
|
Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
|
[] | null | null | null | null | null |
|
GHSA-5p7w-8phh-2f4c
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Himanshu Bing Site Verification plugin using Meta Tag plugin <=Â 1.0 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2017-7411
|
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
|
[
"cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2014-2754
|
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1774 and CVE-2014-1788.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
ICSA-25-226-22
|
Siemens Web Installer
|
The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.
|
[] | null | 7.8 | null | null | null |
GHSA-qvqv-h7xg-x5cc
|
The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419.
|
[] | null | null | null | null | null |
|
CVE-2024-8915
|
Category Icon <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
|
The Category Icon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 6.4 | null | null | null |
CVE-2022-48897
|
arm64/mm: fix incorrect file_map_count for invalid pmd
|
In the Linux kernel, the following vulnerability has been resolved:
arm64/mm: fix incorrect file_map_count for invalid pmd
The page table check trigger BUG_ON() unexpectedly when split hugepage:
------------[ cut here ]------------
kernel BUG at mm/page_table_check.c:119!
Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748
Hardware name: linux,dummy-virt (DT)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : page_table_check_set.isra.0+0x398/0x468
lr : page_table_check_set.isra.0+0x1c0/0x468
[...]
Call trace:
page_table_check_set.isra.0+0x398/0x468
__page_table_check_pte_set+0x160/0x1c0
__split_huge_pmd_locked+0x900/0x1648
__split_huge_pmd+0x28c/0x3b8
unmap_page_range+0x428/0x858
unmap_single_vma+0xf4/0x1c8
zap_page_range+0x2b0/0x410
madvise_vma_behavior+0xc44/0xe78
do_madvise+0x280/0x698
__arm64_sys_madvise+0x90/0xe8
invoke_syscall.constprop.0+0xdc/0x1d8
do_el0_svc+0xf4/0x3f8
el0_svc+0x58/0x120
el0t_64_sync_handler+0xb8/0xc0
el0t_64_sync+0x19c/0x1a0
[...]
On arm64, pmd_leaf() will return true even if the pmd is invalid due to
pmd_present_invalid() check. So in pmdp_invalidate() the file_map_count
will not only decrease once but also increase once. Then in set_pte_at(),
the file_map_count increase again, and so trigger BUG_ON() unexpectedly.
Add !pmd_present_invalid() check in pmd_user_accessible_page() to fix the
problem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2005-2853
|
Multiple cross-site scripting (XSS) vulnerabilities in GuppY 4.5.3a and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the pg parameter to printfaq.php, or the (2) Referer or (3) User-Agent HTTP headers, which are not properly handled by error.php.
|
[
"cpe:2.3:a:guppy:guppy:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.3a:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-11495
|
Buffer overflow in OllyDbg
|
Buffer overflow vulnerability in OllyDbg, version 1.10, which could allow a local attacker to execute arbitrary code due to lack of proper bounds checking.
|
[
"cpe:2.3:a:oilydbg:oilydbg.exe:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-2fwv-2r36-xvh5
|
A vulnerability was found in code-projects Inventory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /php_action/removeProduct.php. The manipulation of the argument productId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-c382-6838-fr3r
|
Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability.
|
[] | 8.4 | 9.8 | null | null | null |
|
CVE-2020-25624
|
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
|
[
"cpe:2.3:a:qemu:qemu:5.0.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5 | null | 4.4 | null |
|
GHSA-m6gp-7pqc-8gc5
|
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
|
[] | null | null | 8.8 | null | null |
|
GHSA-495h-g8p3-vvq5
|
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_dump2() located in code.c. It allows an attacker to cause Denial of Service.
|
[] | null | null | null | null | null |
|
CVE-2023-41792
|
Lack of Authorization and Stored XSS Via SNMP Trap Editor Page
|
Cross-Site Request Forgery (CSRF) vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed Javascript code to be executed in the SNMP Trap Editor. This issue affects Pandora FMS: from 700 through 773.
|
[
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-v4fq-8fr9-cwvf
|
Heap-based buffer overflow in Adobe Flash Player 12.0.0.77 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by Zeguang Zhao and Liang Chen during a Pwn2Own competition at CanSecWest 2014.
|
[] | null | null | null | null | null |
|
GHSA-crg2-x3ch-9fpq
|
Directory traversal vulnerability in Zoho ManageEngine SupportCenter Plus 7.90 allows remote authenticated users to write to arbitrary files via a .. (dot dot) in the component parameter in the Request component to workorder/Attachment.jsp.
|
[] | null | null | null | null | null |
|
GHSA-x7jr-h454-h8h3
|
In the Linux kernel, the following vulnerability has been resolved:iommu/tegra241-cmdqv: Fix alignment failure at max_n_shiftWhen configuring a kernel with PAGE_SIZE=4KB, depending on its setting of
CONFIG_CMA_ALIGNMENT, VCMDQ_LOG2SIZE_MAX=19 could fail the alignment test
and trigger a WARN_ON:
WARNING: at drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c:3646
Call trace:
arm_smmu_init_one_queue+0x15c/0x210
tegra241_cmdqv_init_structures+0x114/0x338
arm_smmu_device_probe+0xb48/0x1d90Fix it by capping max_n_shift to CMDQ_MAX_SZ_SHIFT as SMMUv3 CMDQ does.
|
[] | null | null | null | null | null |
|
GHSA-v8wc-9v93-v894
|
A cross-site scripting (XSS) vulnerability in Image Tile in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via an SVG file.
|
[] | null | null | null | null | null |
|
CVE-2024-46996
|
baserCMS has a Cross-site Scripting (XSS) Vulnerability in Blog posts Feature
|
baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in the Blog posts feature. Version 5.1.2 fixes this issue.
|
[
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2021-0414
|
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561384; Issue ID: ALPS05561384.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2022-30333
|
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
|
[
"cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-4p7q-hmcp-j657
|
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.
|
[] | null | 5 | null | null | null |
|
CVE-2025-4361
|
PHPGurukul Company Visitor Management System department.php sql injection
|
A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. This affects an unknown part of the file /department.php. The manipulation of the argument departmentname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-26q6-82cc-w6fm
|
Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall.
|
[] | null | null | null | null | null |
|
GHSA-9jcm-qwpx-cpq2
|
A vulnerability has been identified in SIMATIC TDC CP51M1 (All versions < V1.1.7). An attacker with network access to the device could cause a Denial-of-Service condition by sending a specially crafted UDP packet. The vulnerability affects the UDP communication of the device. The security vulnerability could be exploited without authentication. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2021:5070
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-django20) security update
|
django: Potential directory-traversal via archive.extract() django: potential directory-traversal via uploaded files django: Potential directory-traversal via uploaded files django: Potential directory traversal via ``admindocs`` django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null | null |
CVE-2024-54909
|
A vulnerability has been identified in GoldPanKit eva-server v4.1.0. It affects the path parameter of the /api/resource/local/download endpoint, where manipulation of this parameter can lead to arbitrary file download.
|
[] | null | 8.1 | null | null | null |
|
GHSA-g59m-qj5c-h6r8
|
User generated PPKG file for Bulk Enroll may have unencrypted sensitive information exposed.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-40890
|
A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.
|
[
"cpe:2.3:a:zbar_project:zbar:0.23.90:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-7vgv-j288-c9h9
|
SQL injection vulnerability in the IP Manager Assistant (IPMA) interface in Cisco Unified Communications Manager (UCM) 10.0(1) and earlier allows remote attackers to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCum05326.
|
[] | null | null | null | null | null |
|
CVE-2017-9809
|
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Information Exposure.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2025-29311
|
Limited secret space in LLDP packets used in onos v2.7.0 allows attackers to obtain the private key via a bruteforce attack. Attackers are able to leverage this vulnerability into creating crafted LLDP packets.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-30004
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
CVE-2008-3116
|
Format string vulnerability in dx8render.dll in Snail Game (aka Suzhou Snail Electronic Company) 5th street (aka Hot Step or High Street 5) allows remote attackers to execute arbitrary code via format string specifiers in a chat message.
|
[
"cpe:2.3:a:hanghai:5th_street:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hanghai:high_street_5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hanghai:hot_step:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-6jmj-xf2x-8v9v
|
Memory corruption in multimedia due to improper check on received export descriptors in Snapdragon Auto
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-49538
|
ColdFusion | XML Injection (aka Blind XPath Injection) (CWE-91)
|
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an XML Injection vulnerability that could lead to arbitrary file system read. An attacker can exploit this issue by injecting crafted XML or XPath queries to access unauthorized files or lead to denial of service. Exploitation of this issue does not require user interaction, and attack must have access to shared secrets.
|
[] | null | 7.4 | null | null | null |
CVE-2024-13079
|
PHPGurukul Land Record System property-details.php sql injection
|
A vulnerability was found in PHPGurukul Land Record System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/property-details.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2016-1819
|
Use-after-free vulnerability in the IOAccelContext2::clientMemoryForType method in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1817 and CVE-2016-1818.
|
[
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2024-1781
|
Totolink X6000R AX3000 shttpd cstecgi.cgi setWizardCfg command injection
|
A vulnerability was found in Totolink X6000R AX3000 9.4.0cu.852_20230719. It has been rated as critical. This issue affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component shttpd. The manipulation leads to command injection. The exploit has been disclosed to the public and may be used. The identifier VDB-254573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*",
"cpe:2.3:a:totolink:ax3000:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 5.8 | null |
CVE-2024-56560
|
slab: Fix too strict alignment check in create_cache()
|
In the Linux kernel, the following vulnerability has been resolved:
slab: Fix too strict alignment check in create_cache()
On m68k, where the minimum alignment of unsigned long is 2 bytes:
Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22
CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783
Stack from 0102fe5c:
0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b
0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044
0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007
01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4
00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004
00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88
Call Trace: [<00425e78>] dump_stack+0xc/0x10
[<0041eb74>] panic+0xd8/0x26c
[<000e7a68>] __kmem_cache_create_args+0x278/0x2e8
[<000e77f0>] __kmem_cache_create_args+0x0/0x2e8
[<0041e5f0>] memset+0x0/0x8c
[<005f67c0>] io_uring_init+0x54/0xd2
The minimal alignment of an integral type may differ from its size,
hence is not safe to assume that an arbitrary freeptr_t (which is
basically an unsigned long) is always aligned to 4 or 8 bytes.
As nothing seems to require the additional alignment, it is safe to fix
this by relaxing the check to the actual minimum alignment of freeptr_t.
|
[] | null | null | null | null | null |
CVE-2016-4420
|
The NFS dissector in Wireshark 2.x before 2.0.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
RHSA-2015:1082
|
Red Hat Security Advisory: kernel security update
|
kernel: net: slab corruption from use after free on INIT collisions kernel: pipe: iovec overrun leading to memory corruption
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null | null |
CVE-2023-35309
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2007-5628
|
PHP remote file inclusion vulnerability in src/scripture.php in The Online Web Library Site (TOWels) 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the pageHeaderFile parameter.
|
[
"cpe:2.3:a:towels:towels:0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-rjgx-9m76-3q4j
|
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
|
[] | null | null | null | null | null |
|
CVE-2024-39470
|
eventfs: Fix a possible null pointer dereference in eventfs_find_events()
|
In the Linux kernel, the following vulnerability has been resolved:
eventfs: Fix a possible null pointer dereference in eventfs_find_events()
In function eventfs_find_events,there is a potential null pointer
that may be caused by calling update_events_attr which will perform
some operations on the members of the ei struct when ei is NULL.
Hence,When ei->is_freed is set,return NULL directly.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2016-6000
|
IBM TRIRIGA Application Platform is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2012-2374
|
CRLF injection vulnerability in the tornado.web.RequestHandler.set_header function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input.
|
[
"cpe:2.3:a:tornadoweb:tornado:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tornadoweb:tornado:2.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-2287
|
The Knight Lab Timeline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.9.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-gj25-c67g-2q9v
|
Uncontrolled search path element vulnerability in Samsung Update prior to version 3.0.77.0 allows attackers to execute arbitrary code as Samsung Update permission.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-40813
|
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Saved Search Creation.
|
[
"cpe:2.3:a:opencrx:opencrx:5.2.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-jjpr-8mcq-wxg3
|
IBM BigFix Remote Control before 9.1.3 does not properly restrict password choices, which makes it easier for remote attackers to obtain access via a brute-force approach.
|
[] | null | null | 8.1 | null | null |
|
CVE-2019-4156
|
IBM Security Access Manager 9.0.1 through 9.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158572.
|
[
"cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
GHSA-q8mh-6qq4-2gv3
|
On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-5608
|
SQL Injection
|
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in the technician reports feature.
|
[
"cpe:2.3:a:manageengine:adaudit_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:8.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:8.1:8100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:8.1:8110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:8.1:8120:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
CVE-2022-41734
|
IBM Maximo Asset Management information disclosure
|
IBM Maximo Asset Management 7.6.1.2 and 7.6.1.3 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 237587.
|
[
"cpe:2.3:a:ibm:maximo_application_suite:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_application_suite:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
RHSA-2017:0170
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.4 on RHEL 6
|
EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 4.3 | null | null |
cisco-sa-20180207-vpcdi
|
Cisco Virtualized Packet Core-Distributed Instance Denial of Service Vulnerability
|
A vulnerability in the ingress packet processing functionality of the Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition.
The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending malicious traffic to the internal distributed instance (DI) network address on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-vpcdi ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-vpcdi"]
|
[] | null | null | 8.6 | null | null |
RHSA-2020:1485
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.13 runc security update
|
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7 | null | null | null |
CVE-2019-15977
|
Cisco Data Center Network Manager Authentication Bypass Vulnerabilities
|
Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
CVE-2011-1858
|
Unspecified vulnerability in HP Service Manager 7.02, 7.11, 9.20, and 9.21 and Service Center 6.2.8 allows local users to bypass intended access restrictions via unknown vectors.
|
[
"cpe:2.3:a:hp:service_center:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.21:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.