id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2024:1367
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: inactive elements in nft_pipapo_walk kernel: refcount leak in ctnetlink_create_conntrack() kernel: out-of-bounds write in qfq_change_class function kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7 | null | null | null |
GHSA-98j3-8c3p-wjgw
|
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. A malicious application may be able to execute arbitrary code with system privileges.
|
[] | null | null | null | null | null |
|
CVE-2007-4804
|
Multiple SQL injection vulnerabilities in AuraCMS 1.5rc allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) hal.php, (2) cetak.php, (3) lihat.php, (4) pesan.php, and (5) teman.php, different vectors than CVE-2007-4171. NOTE: the scripts may be accessed through requests to the product's top-level default URI, using the pilih parameter, in some circumstances.
|
[
"cpe:2.3:a:auracms:auracms:1.5_rc:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3mh7-xjh7-gm2x
|
A vulnerability, which was classified as critical, has been found in AssamLook CMS 1.0. This issue affects some unknown processing of the file /product.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2011-4283
|
Moodle 1.9.x before 1.9.11 and 2.0.x before 2.0.2 places an IMS enterprise enrolment file in the course-files area, which allows remote attackers to obtain sensitive information via a request for imsenterprise-enrol.xml.
|
[
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2017-1192
|
IBM Sterling B2B Integrator 5.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 123663.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
] | null | null | 8.2 | 6.4 | null |
|
CVE-2024-36251
|
The web interface of the affected devices process some crafted HTTP requests improperly, leading to a device crash. More precisely, a crafted parameter to billcodedef_sub_sel.html is not processed properly and device-crash happens. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
|
[
"cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b550wd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b540wr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b547wd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b537wr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
PYSEC-2020-231
| null |
Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources.
|
[] | null | null | null | null | null |
CVE-1999-1477
|
Buffer overflow in GNOME libraries 1.0.8 allows local user to gain root access via a long --espeaker argument in programs such as nethack.
|
[
"cpe:2.3:a:gnome:gnome_libs:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-p97q-577c-vxp7
|
The Image Over Image For WPBakery Page Builder WordPress plugin before 3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2019:3834
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null | null |
GHSA-w4h7-3hcx-qgv6
|
Keystone Engine 0.9.2 has an invalid free in llvm_ks::SmallVectorImpl<llvm_ks::MCFixup>::~SmallVectorImpl.
|
[] | null | null | null | null | null |
|
CVE-2018-18979
|
An issue was discovered in the Ascensia Contour NEXT ONE application for Android before 2019-01-15. It has a statically coded initialization vector. Extraction of the initialization vector is necessary for deciphering communications between this application and the backend server. This, in combination with retrieving any user's encrypted data from the Ascensia cloud through another vulnerability, allows an attacker to obtain and modify any patient's medical information.
|
[
"cpe:2.3:a:ascensia:contour_diabetes:*:*:*:*:*:android:*:*"
] | null | null | 7.4 | 5.8 | null |
|
GHSA-h22v-xv8r-cg6p
|
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 7.8 | null | null | null |
|
GHSA-c4mp-h3m2-h5mc
|
Jenkins CCM Plugin vulnerable to Improper Restriction of XML External Entity Reference
|
Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
|
[] | null | null | 8.3 | null | null |
CVE-2021-22403
|
There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands.
|
[
"cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2010-1845
|
ImageIO in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted PSD image.
|
[
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2016-8728
|
An exploitable heap out of bounds write vulnerability exists in the Fitz graphical library part of the MuPDF renderer. A specially crafted PDF file can cause a out of bounds write resulting in heap metadata and sensitive process memory corruption leading to potential code execution. Victim needs to open the specially crafted file in a vulnerable reader in order to trigger this vulnerability.
|
[
"cpe:2.3:a:artifex:mupdf:1.10:rc1:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
|
RHSA-2022:7049
|
Red Hat Security Advisory: OpenJDK 8u352 Windows Security Update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null | null |
CVE-2018-18815
|
TIBCO JasperReports Server User Information Disclosure
|
The REST API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability that theoretically allows unauthenticated users to bypass authorization checks for portions of the HTTP interface to the JasperReports Server. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.
|
[
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*"
] | null | null | 10 | null | null |
CVE-2016-9585
|
Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.
|
[
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.6 | null |
|
CVE-2011-3087
|
Google Chrome before 19.0.1084.46 does not properly perform window navigation, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2020-0268
|
In NFC, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148294643
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.4 | null | 4.4 | null |
|
CVE-2023-40166
|
Notepad++ heap buffer read overflow in FileManager::detectLanguageFromTextBegining
|
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.
|
[
"cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2023-50030
|
In the module "Jms Setting" (jmssetting) from Joommasters for PrestaShop, a guest can perform SQL injection in versions <= 1.1.0. The method `JmsSetting::getSecondImgs()` has a sensitive SQL call that can be executed with a trivial http call and exploited to forge a blind SQL injection.
|
[
"cpe:2.3:a:joommasters:jmssetting:*:*:*:*:*:prestashop:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-7xg7-crjc-hpjp
|
The FREE Pageplus Activation (aka com.wFREEPageplusActivations) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-4vm8-m2w2-wpqm
|
An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger the vulnerability.
|
[] | null | 7.8 | null | null | null |
|
GHSA-cr72-p8f8-mx4g
|
An ActiveX control in SwDir.dll in Macromedia Shockwave 10 allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via a long string in the swURL attribute.
|
[] | null | null | null | null | null |
|
CVE-2019-10872
|
An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function Splash::blitTransparent at splash/Splash.cc.
|
[
"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-83qq-799j-gmvc
|
Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.
|
[] | null | 8.8 | null | null | null |
|
GHSA-fhg9-w822-5752
|
The neuvoo-jobroll plugin 2.0 for WordPress has neuvoo_location XSS.
|
[] | null | null | null | null | null |
|
CVE-2022-4628
|
Easy PayPal Buy Now Button < 1.7.4 - Contributor+ Stored XSS in Shortcode
|
The Easy PayPal Buy Now Button WordPress plugin before 1.7.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[
"cpe:2.3:a:wpplugin:easy_paypal_buy_now_button:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2002-0892
|
The default configuration of NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to determine the path of the web root via a direct request to com.newatlanta.servletexec.JSP10Servlet without a filename, which leaks the pathname in an error message.
|
[
"cpe:2.3:a:new_atlanta_communications:servletexec_isapi:4.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-457q-vj84-7r8r
|
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
|
[] | null | null | null | null | null |
|
GHSA-8xpw-h2w2-j6vm
|
Directory traversal vulnerability in the Brandon Bowles Open Explorer application before 0.254 Beta for Android allows remote attackers to write to arbitrary files via a crafted filename.
|
[] | null | null | null | null | null |
|
CVE-2018-16767
|
In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an unspecified "heap-buffer-overflow" condition in FunctionValidationContext::popAndValidateOperand.
|
[
"cpe:2.3:a:webassembly_virtual_machine_project:webassembly_virtual_machine:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-c9w9-m25r-3pcx
|
Multiple SQL injection vulnerabilities in u5CMS before 3.9.4 allow remote attackers to execute arbitrary SQL commands via the name parameter to (1) copy2.php, (2) localize.php, (3) metai.php, (4) nc.php, (5) new2.php, or (6) rename2.php in u5admin/; (7) c parameter to u5admin/editor.php; (8) typ parameter to u5admin/meta2.php; or (9) newname parameter to u5admin/rename2.php.
|
[] | null | null | null | null | null |
|
GHSA-rprh-9x53-mwjp
|
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if the credentials are incorrect.
|
[] | null | null | null | null | null |
|
CVE-2024-41725
|
Dover Fueling Solutions ProGauge MAGLINK LX CONSOLE Cross-site Scripting
|
ProGauge MAGLINK LX CONSOLE does not have sufficient filtering on input
fields that are used to render pages which may allow cross site
scripting.
|
[
"cpe:2.3:a:doverfuelingsolutions:maglink_lx_console:*:*:*:*:*:*:*:*",
"cpe:2.3:a:doverfuelingsolutions:maglink_lx4_console:*:*:*:*:*:*:*:*",
"cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx_console_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx_console:-:*:*:*:*:*:*:*",
"cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx4_console_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx4_console:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | null | null | null |
CVE-2024-44573
|
A stored cross-site scripting (XSS) vulnerability in the VLAN configuration of RELY-PCIe v22.2.1 to v23.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[] | null | 4.7 | null | null | null |
|
GHSA-8xmw-vwcq-7673
|
Cross-site scripting (XSS) vulnerability in edit_image.asp in ClickGallery Server 5.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the from parameter.
|
[] | null | null | null | null | null |
|
CVE-2025-8647
|
Kenwood DMX958XR Firmware Update Command Injection Vulnerability
|
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26270.
|
[] | null | null | 6.8 | null | null |
GHSA-xv87-m263-w2mj
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, in the kernel IPA driver, a Use After Free condition can occur.
|
[] | null | null | 7.8 | null | null |
|
GHSA-5f4x-wp5f-727x
|
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
|
[] | null | null | 7.8 | null | null |
|
CVE-2023-6203
|
The Events Calendar < 6.2.8.1 - Unauthenticated Arbitrary Password Protected Post Read
|
The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request
|
[
"cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
CVE-2018-2006
|
IBM Robotic Process Automation with Automation Anywhere 11 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to upload arbitrary files to the system. IBM X-Force ID: 155008.
|
[
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | null | null |
|
CVE-2019-3728
|
RSA BSAFE Crypto-C Micro Edition versions from 4.0.0.0 before 4.0.5.4 and from 4.1.0 before 4.1.4, RSA BSAFE Micro Edition Suite versions from 4.0.0 before 4.0.13 and from 4.1.0 before 4.4 and RSA Crypto-C versions from 6.0.0 through 6.4.* are vulnerable to an out-of-bounds read vulnerability when processing DSA signature. A malicious remote user could potentially exploit this vulnerability to cause a crash in the library of the affected system.
|
[
"cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2009-1532
|
Microsoft Internet Explorer 8 for Windows XP SP2 and SP3; 8 for Server 2003 SP2; 8 for Vista Gold, SP1, and SP2; and 8 for Server 2008 SP2 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via "malformed row property references" that trigger an access of an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objects Memory Corruption Vulnerability" or "HTML Object Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-w37g-w82j-jjmr
|
Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-9630
|
Magento versions 2.3.4 and earlier, 2.2.11 and earlier (see note), 1.14.4.4 and earlier, and 1.9.4.4 and earlier have a business logic error vulnerability. Successful exploitation could lead to privilege escalation.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:community:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2023:6801
|
Red Hat Security Advisory: squid:4 security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null | null |
GHSA-wcjv-6xqv-vm87
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_get_fullscreen_photos of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument user leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
|
[] | 8.7 | 8.8 | null | null | null |
|
GHSA-8whh-hcfg-87f2
|
A CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service,
elevation of privilege, and potentially kernel execution when a malicious actor with local user
access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
|
[] | null | 7.8 | null | null | null |
|
CVE-2018-9571
|
In impd_parse_loud_eq_instructions of impd_drc_dynamic_payload.c there is a possible out-of-bound write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116020594.
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2023-6603
|
Ffmpeg: null pointer dereference in ffmpeg hls parsing
|
A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization.
|
[] | null | 7.5 | null | null | null |
CVE-2012-5409
|
AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack.
|
[
"cpe:2.3:a:siemens:sipass_integrated:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-cx49-mv5g-vq92
|
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.
|
[] | null | null | null | null | null |
|
RHSA-2020:3578
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.8 security update
|
kibana: XSS in TSVB visualization (ESA-2020-08) golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 7.5 | null | null | null |
CVE-2020-29071
|
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving sensitive information about encrypted e-mails, depending on the permissions of the target user.
|
[
"cpe:2.3:a:liquidfiles:liquidfiles:*:*:*:*:*:*:*:*"
] | null | 9 | null | 8.5 | null |
|
CVE-2009-3721
|
Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.
|
[
"cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ytnef_project:ytnef:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2007-5151
|
SQL injection vulnerability in the abget_admin function in includes/nukesentinel.php in NukeSentinel 2.5.12 allows remote attackers to execute arbitrary SQL commands via base64-encoded data in an admin cookie.
|
[
"cpe:2.3:a:nukescripts:nukesentinel:2.5.12:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-3900
|
WinVerifyTrust Signature Validation Vulnerability
|
Why is Microsoft republishing a CVE from 2013?
We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013,
Microsoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.
Vulnerability Description
A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Exploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900
|
[
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-q4r9-w6v3-92hp
|
Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.
|
[] | null | null | null | null | null |
|
CVE-2024-58080
|
clk: qcom: dispcc-sm6350: Add missing parent_map for a clock
|
In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: dispcc-sm6350: Add missing parent_map for a clock
If a clk_rcg2 has a parent, it should also have parent_map defined,
otherwise we'll get a NULL pointer dereference when calling clk_set_rate
like the following:
[ 3.388105] Call trace:
[ 3.390664] qcom_find_src_index+0x3c/0x70 (P)
[ 3.395301] qcom_find_src_index+0x1c/0x70 (L)
[ 3.399934] _freq_tbl_determine_rate+0x48/0x100
[ 3.404753] clk_rcg2_determine_rate+0x1c/0x28
[ 3.409387] clk_core_determine_round_nolock+0x58/0xe4
[ 3.421414] clk_core_round_rate_nolock+0x48/0xfc
[ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc
[ 3.444483] clk_core_set_rate_nolock+0x8c/0x300
[ 3.455886] clk_set_rate+0x38/0x14c
Add the parent_map property for the clock where it's missing and also
un-inline the parent_data as well to keep the matching parent_map and
parent_data together.
|
[] | null | 5.5 | null | null | null |
GHSA-gqvv-2phg-pg6g
|
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount.
|
[] | null | 7.1 | null | null | null |
|
GHSA-hc58-rr2r-q42p
|
Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R005C32, V200R007C00, V200R008C20, V200R008C30, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, NetEngine16EX V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bound write vulnerability. Due to insufficient input validation, a remote, unauthenticated attacker may craft encryption key to the affected products. Successful exploit may cause buffer overflow, services abnormal.
|
[] | null | null | 5.3 | null | null |
|
GHSA-8v4h-p9x9-5mm5
|
The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.
|
[] | null | 4.4 | null | null | null |
|
GHSA-rq2q-54mj-gpp7
|
Huawei E587 Mobile WiFi with firmware before 11.203.30.00.00 allows remote attackers to bypass authentication, change configurations, send messages, and cause a denial of service (device restart) via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-25937
|
Delta Electronics DIAEnergie SQL injection
|
SQL injection vulnerability exists in the script DIAE_tagHandler.ashx.
|
[
"cpe:2.3:a:delta_electronics:diaenergie:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-2xx5-285p-w456
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_T files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18351.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-51671
|
A SQL injection vulnerability was discovered in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability allows remote attackers to execute arbitrary SQL code via the category and categorycode parameters in a POST request to the manage-categories.php file.
|
[] | null | 5.4 | null | null | null |
|
CVE-2018-6669
|
Bypass Application Control through an ASP.NET form
|
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows a remote or local user to execute blacklisted files through an ASP.NET form.
|
[
"cpe:2.3:a:mcafee:application_change_control:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | null | null |
CVE-2024-4760
|
Voltage glitch during startup of the EEFC NVM controller can bypass the security bit
|
A voltage glitch during the startup of EEFC NVM controllers on Microchip SAM E70/S70/V70/V71, SAM G55, SAM 4C/4S/4N/4E, and SAM 3S/3N/3U microcontrollers allows access to the memory bus via the debug interface even if the security bit is set.
|
[
"cpe:2.3:a:amtel:same70:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amtel:sams70:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amtel:samv70:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amtel:samv71:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-gv2m-4p48-px86
|
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF29, 8.0.0.x before 8.0.0.1 CF15, and 8.5.0 before CF05 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[] | null | null | null | null | null |
|
CVE-2023-41983
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-37x6-phq8-3rmq
|
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
|
[] | null | null | null | null | null |
|
GHSA-657m-46f8-q95q
|
Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.5.
|
[] | null | 5.3 | null | null | null |
|
GHSA-mqhw-5r33-x99w
|
Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
[] | null | null | null | null | null |
|
GHSA-3vfw-f9fg-pj3x
|
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'.
|
[] | null | 5.4 | null | null | null |
|
CVE-2017-15191
|
In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-r5fg-xh73-gvjg
|
Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
|
[] | null | null | null | null | null |
|
GHSA-cmgq-6hm8-g996
|
The Fileviewer WordPress plugin through 2.2 does not have CSRF checks in place when performing actions such as upload and delete files. As a result, attackers could make a logged in administrator delete and upload arbitrary files via a CSRF attack
|
[] | null | null | null | null | null |
|
CVE-2010-2639
|
IBM WebSphere Commerce Enterprise 7.0 before 7.0.0.2 allows remote attackers to read messages intended for other recipients via vectors involving access by the outbound messaging system to the RunTimeProfileCacheCmdImpl class, related to the caching of mutable objects and "concurrency issues."
|
[
"cpe:2.3:a:ibm:websphere_commerce:7.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.1:*:enterprise:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-4cww-8m8h-fvjq
|
Directory traversal vulnerability in FlexWATCH Network Camera 3.0 and earlier allows remote attackers to bypass access restrictions for (1) admin/aindex.asp or (2) admin/aindex.html via a .. (dot dot) and encoded / (%2f) sequence in the URL.
|
[] | null | null | null | null | null |
|
GHSA-8qcf-j43v-74g8
|
Sourcecodester Medical Hub Directory Site 1.0 is vulnerable to SQL Injection via /mhds/clinic/view_details.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2014-4018
|
The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors.
|
[
"cpe:2.3:o:zte:zxv10_w300_firmware:1.0.0a_zrd_lk:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-vmch-wc4m-mjqj
|
Cross-site scripting (XSS) vulnerability in user.php in PostNuke 0.64 allows remote attackers to inject arbitrary web script or HTML via the uname parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-6369
|
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.
|
[
"cpe:2.3:a:sap:focused_run:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.7:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2024-25080
|
WebMail in Axigen 10.x before 10.3.3.62 allows XSS via the image attachment viewer.
|
[] | null | 4.7 | null | null | null |
|
CVE-2006-3057
|
Unspecified vulnerability in NetworkManager daemon for DHCP (dhcdbd) allows remote attackers to cause a denial of service (crash) via certain invalid DHCP responses that trigger memory corruption.
|
[
"cpe:2.3:a:gnome:dhcdbd:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:dhcdbd:1.12:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2025:10835
|
Red Hat Security Advisory: sudo security update
|
sudo: LPE via host option
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7 | null | null | null |
CVE-2018-0937
|
ChakraCore and Microsoft Windows 10 1703 and 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, and CVE-2018-0936.
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
CVE-2015-2862
|
Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote authenticated users to read arbitrary files via a crafted HTTP request.
|
[
"cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2015-1116
|
The UIKit View component in Apple iOS before 8.3 displays unblurred application snapshots in the Task Switcher, which makes it easier for physically proximate attackers to obtain sensitive information by reading the device screen.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
ICSA-23-236-06
|
Rockwell Automation Select Distributed I/O Communication Modules
|
Pyramid Solutions' affected products, the Developer and DLL kits for EtherNet/IP Adapter and EtherNet/IP Scanner may be vulnerable to an out-of-bounds write, which may allow an unauthorized threat actor to send a specially crafted packet that may result in a denial-of-service condition.
|
[] | null | null | 8.6 | null | null |
CVE-2021-1310
|
Cisco Webex Meetings Open Redirect Vulnerability
|
A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page, bypassing the warning mechanism that should prompt the user before the redirection. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website, bypassing the Webex URL check that should result in a warning before the redirection to the web page. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to convince users to unknowingly visit malicious sites.
|
[
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
CVE-2015-10052
|
calesanz gibb-modul-151 login redirect
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The patch is named 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:a:gibb-modul-151_project:gibb-modul-151:*:*:*:*:*:*:*:*"
] | null | 4.6 | 4.6 | 5.5 |
https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d
|
CVE-2021-32823
|
Potential Denial-of-Service in bindata
|
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
|
[
"cpe:2.3:a:bindata_project:bindata:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 3.7 | null | null | null |
ICSA-21-182-01
|
Johnson Controls Facility Explorer
|
Sending specifically crafted web messages to the Facility Explorer SNC Series Supervisory Controller (F4-SNC) could give an authenticated F4-SNC user unintended access to the controller 's file system, which may allow an attacker to access or modify system files.CVE-2021-27661 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 8.8 | null | null |
CVE-2018-18547
|
Vesta Control Panel through 0.9.8-22 has XSS via the edit/web/ domain parameter, the list/backup/ backup parameter, the list/rrd/ period parameter, the list/directory/ dir_a parameter, or the filename to the list/directory/ URI.
|
[
"cpe:2.3:a:vestacp:control_panel:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.