id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-53gm-jvjh-xr34
|
wanEditor v4.7.11 was discovered to contain a cross-site scripting (XSS) vulnerability via the video upload function.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-36141
|
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::MethodBody::write(SWF::Writer*, SWF::Context*).
|
[
"cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-3h7p-fxxx-92w8
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix system hang while resume with TBT monitor[Why]
Connected with a Thunderbolt monitor and do the suspend and the system
may hang while resume.The TBT monitor HPD will be triggered during the resume procedure
and call the drm_client_modeset_probe() while
struct drm_connector connector->dev->master is NULL.It will mess up the pipe topology after resume.[How]
Skip the TBT monitor HPD during the resume procedure because we
currently will probe the connectors after resume by default.(cherry picked from commit 453f86a26945207a16b8f66aaed5962dc2b95b85)
|
[] | null | 5.5 | null | null | null |
|
GHSA-9qfx-pcxp-2cw7
|
Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-2f5r-9f46-7fh6
|
An issue was discovered in PbootCMS v1.0.9. There is a SQL Injection that can get important information from the database via the \apps\home\controller\ParserController.php scode parameter.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-3983
|
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.
|
[
"cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-33302
|
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
|
[
"cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:5.0.0:*:*:*:*:*:*:*"
] | null | 4.5 | null | null | null |
|
GHSA-8cjr-r29r-m28v
|
In WiFi, there is a possible disclosure of WiFi password to the end user due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-143534321
|
[] | null | 3.3 | null | null | null |
|
CVE-2016-9109
|
Artifex Software MuJS allows attackers to cause a denial of service (crash) via vectors related to incomplete escape sequences. NOTE: this vulnerability exists due to an incomplete fix for CVE-2016-7563.
|
[
"cpe:2.3:a:artifex:mujs:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2023-37242
|
Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2025:7331
|
Red Hat Security Advisory: nginx security update
|
nginx: TLS Session Resumption Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 4.3 | null | null | null |
CVE-2020-1308
|
DirectX Elevation of Privilege Vulnerability
|
<p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p>
<p>The update addresses the vulnerability by correcting how DirectX handles objects in memory.</p>
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
CVE-2018-15367
|
A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
[
"cpe:2.3:a:trendmicro:antivirus_for_mac_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:antivirus_for_mac_2018:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:antivirus_for_mac_2019:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2023-36492
|
Reflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
|
[
"cpe:2.3:a:ss-proj:shirasagi:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-wr43-rqjg-w5qm
|
Cross-Site Request Forgery (CSRF) vulnerability in German Krutov LOGIN AND REGISTRATION ATTEMPTS LIMIT plugin <= 2.1 versions.
|
[] | null | 4.3 | null | null | null |
|
GHSA-rh8r-r3vj-9w4g
|
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
|
[] | null | null | null | null | null |
|
GHSA-3c9r-8wrp-84w3
|
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-11880
|
An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value.
|
[
"cpe:2.3:a:kde:kmail:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 | null |
|
CVE-2022-48093
|
Seacms v12.7 was discovered to contain a remote code execution (RCE) vulnerability via the ip parameter at admin_ ip.php.
|
[
"cpe:2.3:a:seacms:seacms:12.7:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2017-3251
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.9 (Availability impacts).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
CVE-2015-7921
|
The FTP server in Pro-face GP-Pro EX EX-ED before 4.05.000, PFXEXEDV before 4.05.000, PFXEXEDLS before 4.05.000, and PFXEXGRPLS before 4.05.000 has hardcoded credentials, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of these credentials.
|
[
"cpe:2.3:a:schneider-electric:proface_gp-pro_ex_ex-ed:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:proface_gp-pro_ex_pfxexedls:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:proface_gp-pro_ex_pfxexedv:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:proface_gp-pro_ex_pfxexgrpls:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2021-33494
|
OX App Suite 7.10.5 allows XSS via an OX Chat room title during typing rendering.
|
[
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-48cp-9vmv-3948
|
Directory traversal vulnerability in the nBill (com_netinvoice) component before 2.0.9 standard edition, 2.0.10 lite edition, and 1.2_10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in unspecified vectors related to (1) administrator/components/com_nbill/admin.nbill.php, (2) components/com_nbill/nbill.php, (3) administrator/components/com_netinvoice/admin.netinvoice.php, or (4) components/com_netinvoice/netinvoice.php, as exploited in the wild in November 2010.
|
[] | null | null | null | null | null |
|
CVE-2021-34706
|
Cisco Identity Services Engine XML External Entity Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the web application to perform arbitrary HTTP requests on behalf of the attacker.
|
[
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1\\(0.518\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2\\(0.149\\):*:*:*:*:*:*:*"
] | null | 6.4 | null | null | null |
GHSA-mfrp-4p9c-pp98
|
Cross-Site Request Forgery (CSRF) vulnerability in YITHEMES YITH PayPal Express Checkout for WooCommerce allows Cross Site Request Forgery. This issue affects YITH PayPal Express Checkout for WooCommerce: from n/a through 1.49.0.
|
[] | null | 4.3 | null | null | null |
|
CVE-2022-25650
|
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.27), Mendix Applications using Mendix 8 (All versions < V8.18.14), Mendix Applications using Mendix 9 (All versions < V9.12.0), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.3). When querying the database, it is possible to sort the results using a protected field. With this an authenticated attacker could extract information about the contents of a protected field.
|
[
"cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2006-5739
|
PHP remote file inclusion vulnerability in cpadmin/cpa_index.php in Leicestershire communityPortals 1.0_2005-10-18_12-31-18 allows remote attackers to execute arbitrary PHP code via a URL in the cp_root_path parameter, a different vector than CVE-2006-5280.
|
[
"cpe:2.3:a:leicestershire:communityportals:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-4570
|
IBM Tivoli Netcool Impact 7.1.0 through 7.1.0.16 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 166720.
|
[
"cpe:2.3:a:ibm:tivoli_netcool\\/impact:*:*:*:*:*:*:*:*"
] | null | null | 3.7 | null | null |
|
GHSA-897c-mv4m-8fjj
|
The REST API in CyberArk Password Vault Web Access before 9.9.5 and 10.x before 10.1 allows remote attackers to execute arbitrary code via a serialized .NET object in an Authorization HTTP header.
|
[] | null | null | 9.8 | null | null |
|
CVE-2017-13262
|
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing length decrement operation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69271284.
|
[
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 3.3 | null |
|
RHSA-2012:1362
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: defaultValue security checks not applied (MFSA 2012-89)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-hvvx-fxgw-fmf9
|
admin.php in Maran PHP Shop allows remote attackers to bypass authentication and gain administrative access by setting the user cookie to "demo."
|
[] | null | null | null | null | null |
|
GHSA-88qv-6q9j-fhvv
|
Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.
|
[] | null | null | null | null | null |
|
GHSA-vq8p-qg57-9728
|
In the Linux kernel, the following vulnerability has been resolved:nvmet: always initialize cqe.resultThe spec doesn't mandate that the first two double words (aka results)
for the command queue entry need to be set to 0 when they are not
used (not specified). Though, the target implemention returns 0 for TCP
and FC but not for RDMA.Let's make RDMA behave the same and thus explicitly initializing the
result field. This prevents leaking any data from the stack.
|
[] | null | null | null | null | null |
|
CVE-2007-2777
|
Unrestricted file upload vulnerability in admin/addsptemplate.php in AlstraSoft Template Seller Pro 3.25 and earlier allows remote attackers to execute arbitrary PHP code via an arbitrary .php filename in the zip parameter, which is created under sptemplates/.
|
[
"cpe:2.3:a:alstrasoft:template_seller:*:*:pro:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-vq33-4vgp-4wwp
|
FATEK FvDesigner version 1.5.103 and prior is vulnerable to an out-of-bounds write while processing project files. If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution.
|
[] | null | 7.8 | null | null | null |
|
GHSA-qp79-9v76-98gj
|
SQL injection vulnerability in bluegate_seo.inc.php in the Direct URL module for xt:Commerce, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the coID parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2022-43021
|
OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the entriesPerPage variable.
|
[
"cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-qffx-cq52-9cp7
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | 6.8 | null | null |
|
GHSA-wrr9-hwhq-cmwg
|
An AEM java servlet in AEM versions 6.5.5.0 (and below) and 6.4.8.1 (and below) executes with the permissions of a high privileged service user. If exploited, this could lead to read-only access to sensitive data in an AEM repository.
|
[] | null | null | null | null | null |
|
RHSA-2024:5388
|
Red Hat Security Advisory: kernel security update
|
kernel: net: kernel: UAF in network route management
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.8 | null | null | null |
RHSA-2017:0123
|
Red Hat Security Advisory: docker-latest security, bug fix, and enhancement update
|
docker: insecure opening of file-descriptor allows privilege escalation
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null | null |
CVE-2022-47859
|
Lead Management System v1.0 is vulnerable to SQL Injection via the user_id parameter in changePassword.php.
|
[
"cpe:2.3:a:lead_management_system_project:lead_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-6vp7-mvj6-899c
|
Kofax Power PDF clearInterval Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of app objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20567.
|
[] | null | null | 7.8 | null | null |
|
GHSA-63m5-mq85-j7j5
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 37 of 46).
|
[] | null | null | 8.8 | null | null |
|
GHSA-6p6j-9vgw-x522
|
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.3.982 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2021-43083
|
Apache PLC4X 0.9.0 Buffer overflow in PLC4C via crafted server response
|
Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.
|
[
"cpe:2.3:a:apache:plc4x:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
CVE-2025-1158
|
ESAFENET CDG addPolicyToSafetyGroup.jsp sql injection
|
A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
RHSA-2005:805
|
Red Hat Security Advisory: pam security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-j7gq-x7p9-9cgf
|
In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.
|
[] | null | null | 7.2 | null | null |
|
CVE-2025-45872
|
zrlog v3.1.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the downloadUrl parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wmpx-6wwp-cvc6
|
In the Linux kernel, the following vulnerability has been resolved:ALSA: 6fire: Release resources at card releaseThe current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort(). But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-56723
|
mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices
|
In the Linux kernel, the following vulnerability has been resolved:
mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices
While design wise the idea of converting the driver to use
the hierarchy of the IRQ chips is correct, the implementation
has (inherited) flaws. This was unveiled when platform_get_irq()
had started WARN() on IRQ 0 that is supposed to be a Linux
IRQ number (also known as vIRQ).
Rework the driver to respect IRQ domain when creating each MFD
device separately, as the domain is not the same for all of them.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-vj5g-8qc9-3cwf
|
Multiple Elber products suffer from an unauthenticated device configuration and client-side hidden functionality disclosure.
|
[] | 8.7 | 7.5 | null | null | null |
|
CVE-2016-15046
|
Hanwha Techwin SSM 1.32 & 1.4 ActiveMQ File Upload RCE
|
A client-side remote code execution vulnerability exists in Hanwha Techwin Smart Security Manager (SSM) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges.
This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side.
This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected.
|
[] | 8.6 | null | null | null | null |
GHSA-r53w-cgff-xvw2
|
An issue was discovered on Momentum Axel 720P 5.1.8 devices. A password of EHLGVG is hard-coded for the root and admin accounts, which makes it easier for physically proximate attackers to login at the console.
|
[] | null | null | 6.8 | null | null |
|
GHSA-cvh7-x6f9-3prf
|
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
|
[] | null | null | null | null | null |
|
CVE-2012-1060
|
Multiple cross-site scripting (XSS) vulnerabilities in revisioning_theme.inc in the Taxonomy module in the Revisioning module 6.x-3.13 and other versions before 6.x-3.14 for Drupal allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) tags or (2) term parameters.
|
[
"cpe:2.3:a:rik_de_boer:revisioning:6.x-3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2013-0269
|
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
|
[
"cpe:2.3:a:rubygems:json_gem:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:json_gem:1.7.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-40312
|
Reflected XSS in multiple JSP files in opennms/opennms
|
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
|
[
"cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
GHSA-r645-7j24-cfm7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in douglaskarr Podcast Feed Player Widget and Shortcode allows Stored XSS. This issue affects Podcast Feed Player Widget and Shortcode: from n/a through 2.2.0.
|
[] | null | 6.5 | null | null | null |
|
CVE-2015-6752
|
Cross-site scripting (XSS) vulnerability in the Search API Autocomplete module 7.x-1.x before 7.x-1.3 for Drupal, when the search index is configured to use the HTML filter processor, allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in the returned suggestions.
|
[
"cpe:2.3:a:search_api_autocomplete_project:search_api_autocomplete:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:search_api_autocomplete_project:search_api_autocomplete:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:search_api_autocomplete_project:search_api_autocomplete:7.x-1.2:*:*:*:*:drupal:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-qmrr-73wg-fc4j
|
admin/user/create_user.php in Kolab Groupware Server 1.0.0 places a user password in an HTTP GET request, which allows local administrators, and possibly remote attackers, to obtain cleartext passwords by reading the ssl_access_log file or the referer string.
|
[] | null | null | null | null | null |
|
CVE-2015-3291
|
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2024-3281
|
A vulnerability was discovered in the firmware builds after 8.0.2.3267 and prior to 8.1.3.1301 in CCX devices. A flaw in the firmware build process did not properly restrict access to a resource from an unauthorized actor.
|
[] | null | 8.8 | null | null | null |
|
GHSA-m984-v946-2cj8
|
An issue was discovered on Samsung mobile devices with O(8.x) (with TEEGRIS) software. The Gatekeeper Trustlet allows a brute-force attack on user credentials. The Samsung ID is SVE-2020-16908 (June 2020).
|
[] | null | null | null | null | null |
|
CVE-2025-1702
|
Ultimate Member <= 2.10.0 - Unauthenticated SQL Injection via search Parameter
|
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 2.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null | null |
GHSA-pcc9-2xg6-cr43
|
NVIDIA DGX A100 contains a vulnerability in SBIOS in the Ofbd, where a local user with elevated privileges can cause access to an uninitialized pointer, which may lead to code execution, escalation of privileges, denial of service, and information disclosure. The scope of impact can extend to other components.
|
[] | null | 8.2 | null | null | null |
|
GHSA-qcc8-2v4m-qw7h
|
Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-51471
|
Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.
|
[] | null | 6.9 | null | null | null |
|
CVE-2023-43668
|
Apache InLong: Jdbc Connection Security Bypass in InLong
|
Authorization Bypass Through User-Controlled Key vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,
some sensitive params checks will be bypassed, like "autoDeserizalize","allowLoadLocalInfile"....
.
Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/8604
|
[
"cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2017-14724
|
Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
RHSA-2022:0889
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: double free of the virtual attribute context in persistent search
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
CVE-2020-35867
|
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module.
|
[
"cpe:2.3:a:rusqlite_project:rusqlite:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2014-5549
|
The Puppy Slots (aka air.com.starluxstudios.PuppySlotsFree) application 3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:starluxstudios:puppy_slots:3.0:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2020-15678
|
When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2024-21690
|
This High severity Reflected XSS and CSRF (Cross-Site Request Forgery) vulnerability was introduced in versions 7.19.0, 7.20.0, 8.0.0, 8.1.0, 8.2.0, 8.3.0, 8.4.0, 8.5.0, 8.6.0, 8.7.1, 8.8.0, and 8.9.0 of Confluence Data Center and Server.
This Reflected XSS and CSRF (Cross-Site Request Forgery) vulnerability, with a CVSS Score of 7.1, allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser and force a end user to execute unwanted actions on a web application in which they're currently authenticated which has high impact to confidentiality, low impact to integrity, no impact to availability, and requires user interaction.
Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
* Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.26
* Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.14
* Confluence Data Center and Server 9.0: Upgrade to a release greater than or equal to 9.0.1
See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).
This vulnerability was reported via our Bug Bounty program.
|
[] | null | null | 7.1 | null | null |
|
CVE-2024-47588
|
Information Disclosure vulnerability in SAP NetWeaver Java (Software Update Manager)
|
In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.
|
[] | null | 4.7 | null | null | null |
GHSA-6xw9-67rg-3fpv
|
Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon system and user also can add own log messages and e.g., flood the log entries. An attacker who successfully exploit the vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc.
|
[] | null | 8.2 | null | null | null |
|
GHSA-56m5-6v25-whgm
|
The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[] | null | 4.8 | null | null | null |
|
CVE-2015-0985
|
Cross-site request forgery (CSRF) vulnerability in XZERES 442SR OS on 442SR wind turbines allows remote attackers to hijack the authentication of admins for requests that modify the default user's password via a GET request.
|
[
"cpe:2.3:o:xzeres:442sr_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xzeres:442sr:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-35xw-gh3h-mxj5
|
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1.
|
[] | null | null | null | null | null |
|
CVE-2014-1401
|
Multiple SQL injection vulnerabilities in AuraCMS 2.3 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) search parameter to mod/content/content.php or (2) CLIENT_IP, (3) X_FORWARDED_FOR, (4) X_FORWARDED, (5) FORWARDED_FOR, or (6) FORWARDED HTTP header to index.php.
|
[
"cpe:2.3:a:auracms:auracms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.62:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.2.2:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-673x-h77f-ggvc
|
Memory safety bugs present in Firefox 61. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62.
|
[] | null | null | 8.8 | null | null |
|
GHSA-7g6v-qm5p-vjvg
|
SAP Field Logistics Manage Logistics application OData meta-data property is vulnerable to data tampering, due to which certain fields could be externally modified by an attacker causing low impact on integrity of the application. Confidentiality and availability are not impacted.
|
[] | null | 4.3 | null | null | null |
|
CVE-2015-8672
|
The presentation transmission permission management mechanism in Huawei TE30, TE40, TE50, and TE60 multimedia video conferencing endpoints with software before V100R001C10SPC100 allows remote attackers to cause a denial of service (wired presentation outage) via unspecified vectors involving a wireless presentation.
|
[
"cpe:2.3:o:huawei:te60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te30:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te40:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te50:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-9m2c-xgjp-gppg
|
The Bad Behavior module 6.x-2.x before 6.x-2.2216 and 7.x-2.x before 7.x-2.2216 for Drupal logs usernames and passwords, which allows remote authenticated users with the "administer bad behavior" permission to obtain sensitive information by reading a log file.
|
[] | null | null | null | null | null |
|
CVE-2007-4813
|
Cross-site scripting (XSS) vulnerability in Domino Blogsphere 3.01 Beta 7 allows remote attackers to inject arbitrary web script or HTML via the name field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:domino_blogsphere:domino_blogsphere:3.01_beta7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-8759
|
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-qj3r-6mr5-7w3m
|
Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 3.3 | null | null | null |
|
CVE-2023-21291
|
In visitUris of Notification.java, there is a possible way to reveal image contents from another user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-7p48-v557-ccv7
|
PHP remote file inclusion vulnerability in includes_handler.php in DynaTracker 151 allows remote attackers to execute arbitrary PHP code via a URL in the base_path parameter.
|
[] | null | null | null | null | null |
|
CVE-2006-5513
|
SQL injection vulnerability in GeoNetwork opensource before 2.0.3 allows remote attackers to execute arbitrary SQL commands, and complete a login, via unspecified vectors.
|
[
"cpe:2.3:a:geonetwork:opensource:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-x978-m756-867v
|
A denial of service vulnerability in VBRISeeker.cpp in libstagefright in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32577290.
|
[] | null | null | 5.5 | null | null |
|
CVE-2024-35992
|
phy: marvell: a3700-comphy: Fix out of bounds read
|
In the Linux kernel, the following vulnerability has been resolved:
phy: marvell: a3700-comphy: Fix out of bounds read
There is an out of bounds read access of 'gbe_phy_init_fix[fix_idx].addr'
every iteration after 'fix_idx' reaches 'ARRAY_SIZE(gbe_phy_init_fix)'.
Make sure 'gbe_phy_init[addr]' is used when all elements of
'gbe_phy_init_fix' array are handled.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-2gvv-5vxj-jrw7
|
A CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247 that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
|
[] | null | null | null | null | null |
|
GHSA-frc7-r8x5-7jq8
|
In the Linux kernel, the following vulnerability has been resolved:scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()The function mpt3sas_transport_port_remove() called in
_scsih_expander_node_remove() frees the port field of the sas_expander
structure, leading to the following use-after-free splat from KASAN when
the ioc_info() call following that function is executed (e.g. when doing
rmmod of the driver module):[ 3479.371167] ==================================================================
[ 3479.378496] BUG: KASAN: use-after-free in _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.386936] Read of size 1 at addr ffff8881c037691c by task rmmod/1531
[ 3479.393524]
[ 3479.395035] CPU: 18 PID: 1531 Comm: rmmod Not tainted 5.17.0-rc8+ #1436
[ 3479.401712] Hardware name: Supermicro Super Server/H12SSL-NT, BIOS 2.1 06/02/2021
[ 3479.409263] Call Trace:
[ 3479.411743] <TASK>
[ 3479.413875] dump_stack_lvl+0x45/0x59
[ 3479.417582] print_address_description.constprop.0+0x1f/0x120
[ 3479.423389] ? _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.429469] kasan_report.cold+0x83/0xdf
[ 3479.433438] ? _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.439514] _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.445411] ? _raw_spin_unlock_irqrestore+0x2d/0x40
[ 3479.452032] scsih_remove+0x525/0xc90 [mpt3sas]
[ 3479.458212] ? mpt3sas_expander_remove+0x1d0/0x1d0 [mpt3sas]
[ 3479.465529] ? down_write+0xde/0x150
[ 3479.470746] ? up_write+0x14d/0x460
[ 3479.475840] ? kernfs_find_ns+0x137/0x310
[ 3479.481438] pci_device_remove+0x65/0x110
[ 3479.487013] __device_release_driver+0x316/0x680
[ 3479.493180] driver_detach+0x1ec/0x2d0
[ 3479.498499] bus_remove_driver+0xe7/0x2d0
[ 3479.504081] pci_unregister_driver+0x26/0x250
[ 3479.510033] _mpt3sas_exit+0x2b/0x6cf [mpt3sas]
[ 3479.516144] __x64_sys_delete_module+0x2fd/0x510
[ 3479.522315] ? free_module+0xaa0/0xaa0
[ 3479.527593] ? __cond_resched+0x1c/0x90
[ 3479.532951] ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[ 3479.539607] ? syscall_enter_from_user_mode+0x21/0x70
[ 3479.546161] ? trace_hardirqs_on+0x1c/0x110
[ 3479.551828] do_syscall_64+0x35/0x80
[ 3479.556884] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3479.563402] RIP: 0033:0x7f1fc482483b
...
[ 3479.943087] ==================================================================Fix this by introducing the local variable port_id to store the port ID
value before executing mpt3sas_transport_port_remove(). This local variable
is then used in the call to ioc_info() instead of dereferencing the freed
port structure.
|
[] | null | 7.8 | null | null | null |
|
GHSA-64pf-m95p-gcg5
|
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7 | null | null | null |
|
GHSA-mh62-5j9h-2c77
|
Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Edition software for Windows before version 24.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | 5.4 | 6.7 | null | null | null |
|
GHSA-7hm4-28mg-fmp9
|
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.