id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2015-1841
|
The Web Admin interface in Red Hat Enterprise Virtualization Manager (RHEV-M) allows local users to bypass the timeout function by selecting a VM in the VM grid view.
|
[
"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
GHSA-qvjx-h46h-h827
|
Cross-site scripting (XSS) vulnerability in Junos Space before 15.2R2 allows remote attackers to steal sensitive information or perform certain administrative actions.
|
[] | null | null | 6.1 | null | null |
|
GHSA-f7q5-4r7c-4f6x
|
Cross-site scripting (XSS) vulnerability in the settings page in the Strongarm module 6.x before 6.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via the value field when viewing overridden variables.
|
[] | null | null | null | null | null |
|
RHSA-2022:8609
|
Red Hat Security Advisory: OpenShift Virtualization 4.9.7 Images security update
|
go-restful: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:container_native_virtualization:4.9::el8"
] | null | 9.1 | null | null | null |
CVE-2024-20137
|
In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.
|
[
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2023-42536
|
An improper input validation in saped_dec in libsaped prior to SMR Nov-2023 Release 1 allows local attackers to cause out-of-bounds read and write.
|
[
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
GHSA-7gqq-55wr-j9w3
|
Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains a Local Privilege Escalation vulnerability via XSL Hijacking. A local low-privileged malicious user could potentially exploit this vulnerability and escalate their privilege to the admin user and gain full control of the machine. Exploitation may lead to a complete system compromise.
|
[] | null | 7.3 | null | null | null |
|
CVE-2020-15656
|
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-qwqj-7966-cvmw
|
In unflattenString8 of Sensor.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-269014004
|
[] | null | 5.5 | null | null | null |
|
GHSA-pc69-wrpv-h7r8
|
TYPO3 3.7.1 allows remote attackers to obtain sensitive information via a direct request to (1) thumbs.php, (2) showpic.php, or (3) tables.php, which causes them to incorrectly define a variable and reveal the path in an error message when a require function call fails.
|
[] | null | null | null | null | null |
|
GHSA-25w3-v3vx-g29w
|
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
|
[] | null | 7.5 | null | null | null |
|
GHSA-j9f6-84w2-9q3h
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the yTsiz member of SIZ markers. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4977.
|
[] | null | null | 6.5 | null | null |
|
GHSA-gjv7-5cpp-hqgw
|
In the Linux kernel, the following vulnerability has been resolved:drm/vmwgfx: Prevent unmapping active read buffersThe kms paths keep a persistent map active to read and compare the cursor
buffer. These maps can race with each other in simple scenario where:
a) buffer "a" mapped for update
b) buffer "a" mapped for compare
c) do the compare
d) unmap "a" for compare
e) update the cursor
f) unmap "a" for update
At step "e" the buffer has been unmapped and the read contents is bogus.Prevent unmapping of active read buffers by simply keeping a count of
how many paths have currently active maps and unmap only when the count
reaches 0.
|
[] | null | 4.7 | null | null | null |
|
GHSA-g8w2-r832-c3p7
|
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component matchAndRewriteSortOp<mlir::sparse_tensor::SortOp>(mlir::sparse_tensor::SortOp.
|
[] | null | 5.5 | null | null | null |
|
CVE-2005-1262
|
Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message.
|
[
"cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.78:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.82.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
PYSEC-2020-27
| null |
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
|
[] | null | null | null | null | null |
CVE-2018-21108
|
NETGEAR R7800 devices before 1.0.2.60 are affected by command injection by an authenticated user.
|
[
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
GHSA-fxp8-7h5w-h235
|
XSS in search engine
|
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
|
[] | null | null | 6.1 | null | null |
GHSA-87cf-jj6m-c5rm
|
ICQ 2001a Alpha and earlier allows remote attackers to automatically add arbitrary UINs to an ICQ user's contact list via a URL to a web page with a Content-Type of application/x-icq, which is processed by Internet Explorer.
|
[] | null | null | null | null | null |
|
CVE-2022-22778
|
TIBCO BusinessConnect Trading Community Management Cross-Site Request Forgery Vulnerability
|
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute Cross-Site Request Forgery (CSRF) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.
|
[
"cpe:2.3:a:tibco:businessconnect_trading_community_management:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2005-2512
|
Mail.app in Mac OS 10.4.2 and earlier, when printing or forwarding an HTML message, loads remote images even when the user's preferences state otherwise, which could result in a privacy leak.
|
[
"cpe:2.3:a:apple:mail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
ICSA-22-347-03
|
Contec CONPROSYS HMI System (CHS)
|
CONPROSYS HMI System versions 3.4.4 and prior are vulnerable to an OS Command Injection, which could allow an unauthenticated remote attacker to send specially crafted requests that could execute commands on the server. CVE-2022-44456 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). In CONPROSYS HMI System Ver.3.4.5 and prior, user credential information could be altered by a remote unauthenticated attacker. CVE-2023-22331 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). In CONPROSYS HMI System Ver.3.4.5 and prior, user credentials could be obtained via a machine-in-the-middle attack. CVE-2023-22334 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). In CONPROSYS HMI System Ver.3.4.5 and prior, an arbitrary script could be executed on the web browser of the administrative user logging into the product. This could result in sensitive information being obtained. CVE-2023-22373 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N). In CONPROSYS HMI System Ver.3.4.5 and prior, a remote unauthenticated attacker could obtain the server certificate, including the private key of the product. CVE-2023-22339 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 7.5 | null | null |
GHSA-8qg3-pfc8-ph4h
|
An Improper Handling of Exceptional Conditions vulnerability on specific PTX Series devices, including the PTX1000, PTX3000 (NextGen), PTX5000, PTX10002-60C, PTX10008, and PTX10016 Series, in Juniper Networks Junos OS allows an unauthenticated MPLS-based attacker to cause a Denial of Service (DoS) by triggering the dcpfe process to crash and FPC to restart. On affected PTX Series devices, processing specific MPLS packets received on an interface with multiple units configured may cause FPC to restart unexpectedly. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects PTX Series devices utilizing specific FPCs found on PTX1000, PTX3000 (NextGen), PTX5000, PTX10002-60C, PTX10008, and PTX10016 Series devices, only if multiple units are configured on the ingress interface, and at least one unit has 'family mpls' *not* configured. See the configuration sample below for more information. No other platforms are affected by this vulnerability. This issue affects: Juniper Networks Junos OS on PTX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-32697
|
Form validation can be skipped
|
neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
|
[
"cpe:2.3:a:neos:form:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-pf5p-55wr-2522
|
Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
|
[] | null | null | null | null | null |
|
GHSA-hh28-h22f-8357
|
OpenBao has a Timing Side-Channel in the Userpass Auth Method
|
ImpactWhen using OpenBao's `userpass` auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user.PatchesOpenBao v2.3.2 will patch this issue.WorkaroundsUsers may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/ReferencesThis issue was disclosed to HashiCorp and is the OpenBao equivalent of the following tickets:https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034https://nvd.nist.gov/vuln/detail/CVE-2025-6011Barring further information, this is also assumed to cover and remediate the following additional vulnerability:https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enumeration-in-userpass-auth-method/76095https://nvd.nist.gov/vuln/detail/CVE-2025-6010If this is not the case as further details emerge, a new CVE will be assigned for remediating that. Otherwise, no further CVE will be sought.
|
[] | null | 3.7 | null | null | null |
CVE-2025-7780
|
Ai Engine <= 2.9.4 - Missing URL Scheme Validation to Authenticated (Subscriber+) Arbitrary File Read via simpleTranscribeAudio and get_audio Functions
|
The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4. The simpleTranscribeAudio endpoint fails to restrict URL schemes before calling get_audio(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to read any file on the web server and exfiltrate it via the plugin’s OpenAI API integration.
|
[] | null | 6.5 | null | null | null |
GHSA-29rg-h6c8-h6xh
|
browser/worker_host/message_port_dispatcher.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle certain postMessage calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code that creates a web worker.
|
[] | null | null | null | null | null |
|
CVE-2019-19912
|
In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.
|
[
"cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2019-8525
|
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 7.2 | null |
|
CVE-2016-1761
|
libxml2 in Apple iOS before 9.3, OS X before 10.11.4, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-f8jf-3w6m-6v39
|
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&&action=delete&userid=4.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-7910
|
JetBrains TeamCity before 2019.2 was vulnerable to a stored XSS attack by a user with the developer role.
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2021-40604
|
A Server-Side Request Forgery (SSRF) vulnerability in IPS Community Suite before 4.6.2 allows remote authenticated users to request arbitrary URLs or trigger deserialization via phar protocol when generating class names dynamically. In some cases an exploitation is possible by an unauthenticated user.
|
[
"cpe:2.3:a:invisioncommunity:ips_community_suite:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2020-9544
|
An issue was discovered on D-Link DSL-2640B E1 EU_1.01 devices. The administrative interface doesn't perform authentication checks for a firmware-update POST request. Any attacker that can access the administrative interface can install firmware of their choice.
|
[
"cpe:2.3:o:d-link:dsl-2640b_firmware:e1_eu_1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dsl-2640b:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-v7mq-3qjg-gc4w
|
Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP and SIP firmware might allow remote attackers to execute arbitrary code via a crafted DNS response.
|
[] | null | null | null | null | null |
|
CVE-2025-7863
|
thinkgem JeeSite ServletUtils.java redirectUrl
|
A vulnerability was found in thinkgem JeeSite up to 5.12.0 and classified as problematic. Affected by this issue is the function redirectUrl of the file src/main/java/com/jeesite/common/web/http/ServletUtils.java. The manipulation of the argument url leads to open redirect. The attack may be launched remotely. The name of the patch is 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
|
[] | 5.1 | 3.5 | 3.5 | 4 |
https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cedc3
|
GHSA-jc5r-pjvg-3hgp
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1706, CVE-2015-1711, CVE-2015-1717, and CVE-2015-1718.
|
[] | null | null | null | null | null |
|
GHSA-4c69-x35c-cmxf
|
PHP remote file inclusion vulnerability in mod_chatting/themes/default/header.php in Family Connections Who is Chatting 2.2.3 allows remote attackers to execute arbitrary PHP code via a URL in the TMPL[path] parameter.
|
[] | null | null | null | null | null |
|
GHSA-24r3-qrv6-6jx6
|
The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
RHSA-2008:0132
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Vulnerabilities in Java Web Start allow to determine the location of the Java Web Start cache Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy Anti-DNS Pinning and Java Applets with Opera and Firefox Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass Java-API calls in untrusted Javascript allow network privilege escalation
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
GHSA-625w-pj52-7g22
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
CVE-2022-0730
|
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
|
[
"cpe:2.3:a:cacti:cacti:1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 | null |
|
GHSA-xx27-vcf5-wm84
|
Wrong public key usage from existing oem_keystore for hash generation in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, QM215, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDX20
|
[] | null | null | null | null | null |
|
GHSA-23x8-q6vj-xc33
|
An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the fullname parameter to signup.php.
|
[] | null | null | 6.1 | null | null |
|
RHSA-2005:017
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null | null |
CVE-2022-0479
|
Popup Builder < 4.1.1 - SQL Injection to Reflected Cross-Site Scripting
|
The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link
|
[
"cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
GHSA-4jwc-jh6r-hp93
|
u'Possibility of integer overflow in keymaster 4 while allocating memory due to multiplication of large numcerts value and size of keymaster bob which can lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null | null |
|
CVE-2013-3129
|
Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
|
[
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:-:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:-:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync_basic:2013:-:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync_basic:2013:-:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.0.61118.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.1.10411.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:silverlight:5.1.20125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-pvv4-m6qj-jw53
|
In FreeBSD 12.1-STABLE before r362281, 11.4-STABLE before r362281, and 11.4-RELEASE before p1, long values in the user-controlled PATH environment variable cause posix_spawnp to write beyond the end of the heap allocated stack possibly leading to arbitrary code execution.
|
[] | null | null | null | null | null |
|
GHSA-wfq6-vc3m-f5f7
|
A local bypass security restrictions vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
|
[] | null | 6.2 | null | null | null |
|
ICSA-22-132-15
|
Siemens OpenV2G
|
The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
|
[] | null | 6.2 | null | null | null |
GHSA-37xv-hhg6-7q67
|
In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388.
|
[] | null | 6.7 | null | null | null |
|
CVE-2018-10805
|
ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-28:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2024-13102
|
D-Link DIR-816 A2 DDNS Service access control
|
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 5.3 | 5.3 | 5 | null |
GHSA-342w-jw3g-59cj
|
steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6j4v-w58q-pm82
|
In the Parallax Scroll (aka adamrob-parallax-scroll) plugin before 2.1 for WordPress, includes/adamrob-parralax-shortcode.php allows XSS via the title text. ("parallax" has a spelling change within the PHP filename.)
|
[] | null | null | 6.1 | null | null |
|
GHSA-jmj4-3mjm-f28c
|
Possible buffer overflow due to improper validation of index value while processing the plugin block in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
|
[] | null | null | null | null | null |
|
GHSA-c3x7-gjmx-r2ff
|
Open Redirect in serve-static
|
Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory.Proof of ConceptA link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e`Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect.RecommendationVersion 1.7.x: Update to version 1.7.2 or later.
Version 1.6.x: Update to version 1.6.5 or later.
|
[] | null | 3.1 | null | null | null |
CVE-2015-1438
|
Heap-based buffer overflow in Panda Security Kernel Memory Access Driver 1.0.0.13 allows attackers to execute arbitrary code with kernel privileges via a crafted size input for allocated kernel paged pool and allocated non-paged pool buffers.
|
[
"cpe:2.3:a:panda_security:panda_antivirus_pro_2015:1.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:panda_security:panda_global_protection_2015:1.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:panda_security:panda_gold_protection_2015:1.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:panda_security:panda_internet_security_2015:1.0.0.13:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
RHSA-2018:2486
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update
|
expat: Out-of-bounds heap read on crafted input causing crash httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir libxml2: Use after free triggered by XPointer paths beginning with range-to curl: escape and unescape integer overflows curl: Cookie injection for other servers curl: Case insensitive password comparison curl: Out-of-bounds write via unchecked multiplication curl: Double-free in curl_maprintf curl: Double-free in krb5 code curl: curl_getdate out-of-bounds read curl: URL unescape heap overflow via integer truncation curl: Use-after-free via shared cookies curl: Invalid URL parsing with '#' curl: IDNA 2003 makes curl use wrong host libxml2: XML External Entity vulnerability libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS) libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS) libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c) pcre: stack-based buffer overflow write in pcre32_copy_substring pcre: stack-based buffer overflow write in pcre32_copy_substring libxml2: Buffer overflow in function xmlSnprintfElementContent libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey libxml2: Heap-based buffer over-read in function xmlDictAddString libxml2: Unrestricted memory usage in xz_head() function in xzlib.c curl: FTP PWD response parser out of bounds read curl: IMAP FETCH response out of bounds read curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null | null |
GHSA-xj67-986p-6xph
|
EMU Webmail allows local users to execute arbitrary programs via a .. (dot dot) in the HTTP Host header that points to a Trojan horse configuration file that contains a pageroot specifier that contains shell metacharacters.
|
[] | null | null | null | null | null |
|
GHSA-24pq-f9c8-764p
|
ganglia-web (aka Ganglia Web Frontend) through 3.7.5 allows XSS via the header.php cs parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-25736
|
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request.
|
[
"cpe:2.3:h:wyrestorm:apollo_vx20:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-v658-rgxj-fq9r
|
Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
GHSA-4q3c-cj7g-jcwf
|
Gradio has several components with post-process steps allow arbitrary file leaks
|
Impact**What kind of vulnerability is it? Who is impacted?**This is a **data validation vulnerability** affecting several Gradio components, which allows arbitrary file leaks through the post-processing step. Attackers can exploit these components by crafting requests that bypass expected input constraints. This issue could lead to sensitive files being exposed to unauthorized users, especially when combined with other vulnerabilities, such as issue TOB-GRADIO-15. The components most at risk are those that return or handle file data.Vulnerable Components:**String to FileData:** DownloadButton, Audio, ImageEditor, Video, Model3D, File, UploadButton.**Complex data to FileData:** Chatbot, MultimodalTextbox.**Direct file read in preprocess:** Code.**Dictionary converted to FileData:** ParamViewer, Dataset.Exploit Scenarios:A developer creates a Dropdown list that passes values to a DownloadButton. An attacker bypasses the allowed inputs, sends an arbitrary file path (like `/etc/passwd`), and downloads sensitive files.An attacker crafts a malicious payload in a ParamViewer component, leaking sensitive files from a server through the arbitrary file leak.PatchesYes, the issue has been resolved in `gradio>5.0`. Upgrading to the latest version will mitigate this vulnerability.
|
[] | 6.9 | 5.3 | null | null | null |
GHSA-4jrj-gxg8-2frj
|
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-52332
|
igb: Fix potential invalid memory access in igb_init_module()
|
In the Linux kernel, the following vulnerability has been resolved:
igb: Fix potential invalid memory access in igb_init_module()
The pci_register_driver() can fail and when this happened, the dca_notifier
needs to be unregistered, otherwise the dca_notifier can be called when
igb fails to install, resulting to invalid memory access.
|
[] | null | null | null | null | null |
GHSA-9r88-88v4-3j6c
|
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
|
[] | null | null | null | null | null |
|
GHSA-5mw9-mr3r-536c
|
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
|
[] | null | null | null | null | null |
|
GHSA-vpr5-jfp7-mh29
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, a string can fail to be null-terminated in SIP leading to a buffer overflow.
|
[] | null | null | 9.8 | null | null |
|
CVE-2016-3724
|
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
|
[
"cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-wxx2-gqvv-34hx
|
OpenStack Swift allows authenticated users to cause a denial of service
|
OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.
|
[] | null | null | null | null | null |
GHSA-j7px-6hwj-hpjg
|
Open Redirect in OAuth2 Proxy
|
ImpactAs users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided.Patches@rootxharsh and @iamnoooob provided this patch as potential solution:This issue was also reported to us separately by @mik317 several hours laterThe fix was implemented in [#xxx]() and released as version 5.1.1
|
[] | null | 7.1 | null | null | null |
CVE-2017-9888
|
IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at FPX!FPX_GetScanDevicePropertyGroup+0x00000000000031a0."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:fpx:4.46:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-hhph-6cw5-hfgq
|
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 2 of 4).
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-8402
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
cisco-sa-ipv4-vfr-dos-CXxtFacb
|
Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability
|
A vulnerability in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper reassembly of large packets that occurs when VFR is enabled on either a tunnel interface or on a physical interface that is configured with a maximum transmission unit (MTU) greater than 4,615 bytes. An attacker could exploit this vulnerability by sending fragmented packets through a VFR-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2023 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2023 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74842"].
|
[] | null | 8.6 | null | null | null |
GHSA-v8jq-3323-h75c
|
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request.
|
[] | null | 6.5 | null | null | null |
|
CVE-2001-0092
|
A function in Internet Explorer 5.0 through 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a new variant of the "Frame Domain Verification" vulnerability.
|
[
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-g6qp-9v7f-3wh3
|
Mattermost fails to validate the type of the "reminder" body request parameter allowing an attacker to crash the Playbook Plugin when updating the status dialog.
|
[] | null | 4.3 | null | null | null |
|
CVE-2018-12365
|
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
RHSA-2023:7521
|
Red Hat Security Advisory: OpenShift Virtualization 4.13.6 RPMs security and bug fix update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.5 | null | null | null |
GHSA-2mjm-r2vj-c5c6
|
Unspecified vulnerability in the camera application in HP Palm webOS 1.4.1 allows local users to overwrite arbitrary files via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-ghw3-5qvm-3mqc
|
CodeIgniter4 allows spoofing of IP address when using proxy
|
ImpactThis vulnerability may allow attackers to spoof their IP address when your server is behind a reverse proxy.PatchesUpgrade to v4.2.11 or later, and configure `Config\App::$proxyIPs`.WorkaroundsDo not use `$request->getIPAddress()`.Referenceshttps://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\HTTP\Request::getIPAddressFor more informationIf you have any questions or comments about this advisory:Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
[] | null | 7 | null | null | null |
CVE-2024-22445
|
Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
|
[
"cpe:2.3:a:dell:powerprotect_data_manager:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-79gj-xgq6-77vj
|
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in Kai Blankenhorn Bitfolge simple and nice index file (aka snif) 1.5.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the externalConfig parameter. NOTE: CVE and other third parties dispute this vulnerability because $externalConfig is defined before use.
|
[] | null | null | null | null | null |
|
RHSA-2024:4349
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: crypto: qat - resolve race condition during AER recovery kernel: xen-netfront: Add missing skb_mark_for_recycle kernel: smb: client: fix UAF in smb2_reconnect_server() kernel: net/mlx5: Properly link new fs rules into the tree
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null | null |
GHSA-m254-f6h4-p93g
|
Jenkins AsakusaSatellite Plugin Does not Mask API Keys via Job Configuration Form
|
Jenkins AsakusaSatellite Plugin 0.1.1 and earlier stores AsakusaSatellite API keys unencrypted in job config.xml files on the Jenkins controller as part of its configuration.These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them.As of publication of this advisory, there is no fix.
|
[] | null | 4.3 | null | null | null |
GHSA-9359-5m76-c22m
|
CFNetwork in Apple iOS before 8.3 does not delete HTTP Strict Transport Security (HSTS) state information in response to a Safari history-clearing action, which allows attackers to obtain sensitive information by reading a history file.
|
[] | null | null | null | null | null |
|
CVE-2023-27238
|
LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning.
|
[
"cpe:2.3:a:lavalite:lavalite:9.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2009-3924
|
Buffer overflow in pbsv.dll, as used in Soldier of Fortune II and possibly other applications when Even Balance PunkBuster 1.728 or earlier is enabled, allows remote attackers to cause a denial of service (application server crash) and possibly execute arbitrary code via a long restart packet.
|
[
"cpe:2.3:a:raven_software:soldier_of_fortune_2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.272:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.457:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.458:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.641:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.642:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.718:*:*:*:*:*:*:*",
"cpe:2.3:a:punkbuster:punkbuster:1.723:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-49c5-c84r-247p
|
Integer overflow in the ProcAuWriteElement function in server/dia/audispatch.c in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large max_samples value.
|
[] | null | null | null | null | null |
|
CVE-2007-2487
|
Stack-based buffer overflow in AtomixMP3 allows remote attackers to execute arbitrary code via a long filename in an MP3 file, a different vector than CVE-2006-6287.
|
[
"cpe:2.3:a:atomix_productions:atomixmp3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2007:0509
|
Red Hat Security Advisory: evolution security update
|
evolution malicious server arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-vrr9-g953-pjgq
|
An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.
|
[] | null | 8.4 | null | null | null |
|
CVE-2020-17409
|
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers with firmware 1.0.66. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10754.
|
[
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jnr3210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr3210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
CVE-2022-26613
|
PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability via the category parameter in categorymenu.php.
|
[
"cpe:2.3:a:php-cms_project:php-cms:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2023-48929
|
Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Session Fixation. The 'sid' parameter in the group_status.asp resource allows an attacker to escalate privileges and obtain sensitive information.
|
[
"cpe:2.3:a:franklin-electric:system_sentinel_anyware:1.6.24.492:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2022-43781
|
There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
|
[
"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.