id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2024-21662
Argo CD vulnerable to Bypassing of Rate Limit and Brute Force Protection Using Cache Overflow
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can effectively bypass the rate limit and brute force protections by exploiting the application's weak cache-based mechanism. This loophole in security can be combined with other vulnerabilities to attack the default admin account. This flaw undermines a patch for CVE-2020-8827 intended to protect against brute-force attacks. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. This cache is limited to a `defaultMaxCacheSize` of 1000 entries. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account. This is a severe vulnerability that enables attackers to perform brute force attacks at an accelerated rate, especially targeting the default admin account. Users should upgrade to version 2.8.13, 2.9.9, or 2.10.4 to receive a patch.
[ "cpe:2.3:a:linuxfoundation:argo-cd:2.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:argo-cd:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-7p43-ch8g-7vxg
PDF-XChange Editor Net.HTTP.requests Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the Net.HTTP.requests method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-20211.
[]
null
null
5.5
null
null
GHSA-mfrf-wpm5-gv78
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device.When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart.The leak can be monitored with the CLI command:show task memory detail | match task_shard_mgmt_cookiewhere the allocated memory in bytes can be seen to continuously increase with each exploitation.This issue affects:Junos OS:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S11,22.2 versions before 22.2R3-S7,22.4 versions before 22.4R3-S7,23.2 versions before 23.2R2-S4,23.4 versions before 23.4R2-S4,24.2 versions before 24.2R2,24.4 versions before 24.4R1-S2, 24.4R2;Junos OS Evolved:all versions before 22.2R3-S7-EVO22.4-EVO versions before 22.4R3-S7-EVO,23.2-EVO versions before 23.2R2-S4-EVO,23.4-EVO versions before 23.4R2-S4-EVO,24.2-EVO versions before 24.2R2-EVO,24.4-EVO versions before 24.4R2-EVO.
[]
6.8
5.5
null
null
null
CVE-2023-49676
CODESYS: Use after free vulnerability through corrupted project files
An unauthenticated local attacker may trick a user to open corrupted project files to crash the system due to use after free vulnerability.
[]
null
5.5
null
null
null
GHSA-wr5j-q359-6vr2
backup-agoddard and backup_checksum have Information Exposure vulnerability
(1) `lib/backup/cli/utility.rb` in the `backup-agoddard` gem 3.0.28 and (2) `lib/backup/cli/utility.rb` in the `backup_checksum` gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process.
[]
null
null
7.8
null
null
GHSA-hx93-vr6p-r3mw
In Parse_lins of eas_mdls.c, there is possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127313764
[]
null
null
null
null
null
GHSA-5xp9-mqm3-5jw2
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module.
[]
null
null
9.8
null
null
CVE-2016-4290
When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a block of data within the file. When calculating this length, the application will use a value from the file and add a constant to it without checking whether the addition of the constant will cause the integer to overflow which will cause the buffer to be undersized when the application tries to copy file data into it. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application.
[ "cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-q65r-m36g-g835
A directory permissions management vulnerability in Lenovo System Update may allow elevation of privileges.
[]
null
7
null
null
null
GHSA-pxvc-5jrx-h52p
A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
6.3
null
null
null
CVE-2017-18452
cPanel before 64.0.21 allows code execution via Rails configuration files (SEC-259).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
6.7
4.6
null
RHSA-2012:1186
Red Hat Security Advisory: katello security update
Katello: Application.config.secret_token is not generated properly
[ "cpe:/a:cloudforms_systemengine:1::el6" ]
null
null
null
null
null
GHSA-q7p4-7xjv-j3wf
Fabio allows HTTP clients to manipulate custom headers it adds
SummaryFabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers.Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities.However, it was found that some of these custom headers can indeed be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. By setting the following connection header, the X-Forwarded-Host header can, for example, be removed:Similar critical vulnerabilities have been identified in other web servers and proxies, including [CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813) in Apache HTTP Server and [CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv) in Traefik.DetailsIt was found that the following headers can be removed in this way (i.e. by specifying them within a connection header):X-Forwarded-HostX-Forwarded-PortX-Forwarded-ProtoX-Real-IpForwardedPoCThe following docker-compose file was used for testing:The fabio.properties configuration:A Python container runs a simple HTTP server that logs received headers. The Dockerfile:Python Flask ServerA normal HTTP request/response pair looks like this:Requestcurl commandResponseServer LogNext, a request, where the Forwarded header is defined as a hop-by-hop header via the Connection header is sent:Requestcurl commandResponseServer LogsThe response shows that Fabio's `Forwarded` header was removed from the requestImpactIf the backend application trusts these custom headers for security-sensitive operations, their removal or modification may lead to vulnerabilities such as access control bypass.This vulnerability has a critical severity rating similar to [CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813) (Apache HTTP Server, 9.8) and [CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv) (Traefik, 9.3)Stripping headers like `X-Real-IP` can confuse the upstream server about whether the request is coming from an external client through the reverse proxy or from an internal source. This type of vulnerability can be exploited as demonstrated in: [Versa Concerto RCE](https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce).References[CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv)[CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813)[Versa Concerto RCE](https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce)
[]
null
9.1
null
null
null
GHSA-892c-ggr4-vgr5
Cross-site scripting (XSS) vulnerability in the help component of SAP BusinessObjects Financial Consolidation 10.0.0.1933 allows remote attackers to inject arbitrary web script or HTML via a GET request. /finance/help/en/frameset.htm is the URI for this component. The vendor response is SAP Security Note 2368106.
[]
null
null
4.7
null
null
CVE-2007-1950
Cross-site scripting (XSS) vulnerability in index_cms.php in WebBlizzard CMS allows remote attackers to inject arbitrary web script or HTML via the Suchzeile parameter.
[ "cpe:2.3:a:webblizzard:content_management_system:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2018-1495
IBM FlashSystem V840 and V900 products could allow an authenticated attacker with specialized access to overwrite arbitrary files which could cause a denial of service. IBM X-Force ID: 141148.
[ "cpe:2.3:o:ibm:flashsystem_900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:flashsystem_840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_840:-:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
CVE-1999-1164
Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang.
[ "cpe:2.3:a:microsoft:outlook:97:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-25780
Information leak via device availability query function
Information Exposure vulnerability in web UI of Secomea GateManager allows logged in user to query devices outside own scope.
[ "cpe:2.3:o:secomea:gatemanager_4250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:secomea:gatemanager_4250:-:*:*:*:*:*:*:*", "cpe:2.3:o:secomea:gatemanager_4260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:secomea:gatemanager_4260:-:*:*:*:*:*:*:*", "cpe:2.3:o:secomea:gatemanager_8250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:secomea:gatemanager_8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:secomea:gatemanager_9250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:secomea:gatemanager_9250:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2014-3681
Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-30459
SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default).
[ "cpe:2.3:a:smartptt:smartptt_scada:1.1:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2006-5896
REMLAB Web Mech Designer 2.0.5 allows remote attackers to obtain the full path of the script via an incorrect Tonnage parameter to calculate.php that triggers a divide-by-zero error, which leaks the path in an error message.
[ "cpe:2.3:a:remlab:web_mech_designer:2.0.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-14478
IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611
A local, authenticated attacker could use an XML External Entity (XXE) attack to exploit weakly configured XML files to access local or remote content. A successful exploit could potentially cause a denial-of-service condition and allow the attacker to arbitrarily read any local file via system-level services.
[ "cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*" ]
null
7.1
null
5.6
null
GHSA-pc34-r93m-6qjp
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows remote authenticated users to bypass intended access restrictions and read configuration files by leveraging the Mobile and Remote Access (MRA) role and establishing a TFTP session, aka Bug ID CSCuv78531.
[]
null
null
null
null
null
GHSA-r6hg-m6fm-hgwr
Improper authorization in Dynamics 365 Business Central resulted in a vulnerability that allows an authenticated attacker to elevate privileges over a network.
[]
null
8.1
null
null
null
GHSA-r3xc-mh5x-gjfq
Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of service via local access.
[]
5.6
5.3
null
null
null
CVE-2021-30074
docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character.
[ "cpe:2.3:a:docsifyjs:docsify:4.12.1:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-6j3v-c2g4-6qqf
The WP Data Access – App, Table, Form and Chart Builder plugin plugin for WordPress is vulnerable to SQL Injection via the 'order[user_login][dir]' parameter in all versions up to, and including, 5.5.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
7.5
null
null
null
CVE-2018-11965
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Anyone can execute proptrigger.sh which will lead to change in properties.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
GHSA-hwv7-wjc3-wjwc
Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via the User Avatar attribute.
[]
null
null
null
null
null
CVE-2024-10548
WP Project Manager <= 2.6.15 - Authenticated (Subscriber+) Sensitive Information Exposure via Project Task List REST API
The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators).
[]
null
6.5
null
null
null
CVE-2005-4820
SMC Wireless Router model SMC7904WBRA allows remote attackers to cause a denial of service (reboot) by flooding the router with traffic.
[ "cpe:2.3:h:smc_networks:smc7904wbra:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2015-8547
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
[ "cpe:2.3:a:quassel-irc:quassel:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-756x-w82w-pwjj
QuickTime in Apple OS X before 10.11.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FlashPix image, a different vulnerability than CVE-2016-1767.
[]
null
null
7.8
null
null
CVE-2018-2857
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: HTTP data path subsystems). The supported version that is affected is Prior to 8.7.17. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data as well as unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:*:*:*:*:*:*:*:*" ]
null
null
6.3
6.5
null
CVE-2021-36805
Akaunting Invoice Footer Persistent XSS
Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in the sales invoice processing component of the application. This issue was fixed in version 2.1.13 of the product.
[ "cpe:2.3:a:akaunting:akaunting:*:*:*:*:*:*:*:*" ]
null
5.2
null
null
null
GHSA-xjrj-rw96-5445
A vulnerability in the ConfD server in Cisco Ultra Services Platform could allow an authenticated, local attacker to view sensitive information. More Information: CSCvd29398. Known Affected Releases: 21.0.v0.65839.
[]
null
null
5.5
null
null
GHSA-3q86-gfmq-f6c6
Buffer overflow in BIND 8.2 via NXT records.
[]
null
null
null
null
null
CVE-2020-16120
Unprivileged overlay + shiftfs read access
Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
5.1
null
null
null
CVE-2001-0328
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
[]
null
null
null
5
null
CVE-2012-6459
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.
[ "cpe:2.3:a:intel:connman:1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-11826
Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress <= 3.10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'quillforms-popup' shortcode in all versions up to, and including, 3.10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2020-11529
Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x.
[ "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
null
GHSA-hwgj-465x-qhm2
Buffer overflow in libmysqlclient.so in MySQL 3.23.33 and earlier allows remote attackers to execute arbitrary code via a long host parameter.
[]
null
null
null
null
null
CVE-2014-1459
SQL injection vulnerability in dg-admin/index.php in doorGets CMS 5.2 and earlier allows remote authenticated administrators to execute arbitrary SQL commands via the _position_down_id parameter. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
[ "cpe:2.3:a:doorgets:doorgets_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:doorgets:doorgets_cms:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:doorgets:doorgets_cms:4.0:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2018-19889
An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 6 case.
[ "cpe:2.3:a:audiocoding:freeware_advanced_audio_coder:1.29.9.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
[ "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:2.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-8357-fjvx-xrm8
Microweber has Reflected XSS Vulnerability in the id Parameter
Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
[]
null
6.1
null
null
null
GHSA-849p-5hj4-w47q
** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
9.8
null
null
null
GHSA-vcxx-p2xf-cf5w
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and before 7.0.10 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI commands
[]
null
6.7
null
null
null
RHSA-2022:5529
Red Hat Security Advisory: squid:4 security update
squid: DoS when processing gopher server responses
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
null
GHSA-p3fq-j9q2-xx6p
IBM Jazz Foundation products could disclose sensitive information to an authenticated attacker that could be used in further attacks against the system. IBM X-Force ID: 139026.
[]
null
null
6.5
null
null
CVE-2006-5019
Google Mini 4.4.102.M.36 and earlier allows remote attackers to obtain sensitive information via a direct request for /search with an invalid client parameter, which reveals the path in an error message.
[ "cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-283j-88x2-fqpr
Multiple SQL injection vulnerabilities in aWebNews 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) user123 variable in (a) login.php or (b) fpass.php; or (2) cid parameter to (c) visview.php.
[]
null
null
null
null
null
GHSA-29r7-6cj9-gh39
A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
6.6
null
null
CVE-2022-23804
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:kicad:eda:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2020-27272
SOOIL Developments CoLtd DiabecareRS, AnyDana-i, AnyDana-A, The communication protocol of the insulin pump and AnyDana-i,AnyDana-A mobile apps doesn't use adequate measures to authenticate the pump before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the keys and spoof the pump via BLE.
[ "cpe:2.3:o:sooil:anydana-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sooil:anydana-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sooil:anydana-i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sooil:anydana-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:sooil:diabecare_rs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sooil:diabecare_rs:-:*:*:*:*:*:*:*" ]
null
5.7
null
2.9
null
CVE-2025-38171
power: supply: max77705: Fix workqueue error handling in probe
In the Linux kernel, the following vulnerability has been resolved: power: supply: max77705: Fix workqueue error handling in probe The create_singlethread_workqueue() doesn't return error pointers, it returns NULL. Also cleanup the workqueue on the error paths.
[]
null
null
null
null
null
CVE-2024-11606
Tabs Shortcode <= 2.0.2 - Contributor+ XSS via Shortcode
The Tabs Shortcode WordPress plugin through 2.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.3
null
null
null
GHSA-5c2q-g9wc-9gf6
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
[]
null
7.7
null
null
null
GHSA-5px6-qr34-v59r
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /viewrequest.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
CVE-2023-34552
In certain EZVIZ products, two stack based buffer overflows in mulicast_parse_sadp_packet and mulicast_get_pack_type functions of the SADP multicast protocol can allow an unauthenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214.
[ "cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr-mul_firmware:5.3.2:build230218:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-c6n-r101-1g2wf_firmware:5.3.0:build230215:*:*:*:*:*:*", "cpe:2.3:a:ezviz:cv310-a0-1b2wfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-c6n-b0-1g2wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-c6n-b0-1g2wf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-c6n-r101-1g2wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-c6n-r101-1g2wf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-cv310-a0-1b2wfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-cv310-a0-1b2wfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-cv310-a0-1c2wfr-c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-cv310-a0-1c2wfr-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr-mul_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-c6n-a0-1c2wfr-mul:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-cv310-a0-3c2wfrl-1080p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-cv310-a0-3c2wfrl-1080p:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-cv310-a0-1c2wfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-cv310-a0-1c2wfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:cs-cv248-a0-32wmfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:cs-cv248-a0-32wmfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:ezviz:lc1c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ezviz:lc1c:-:*:*:*:*:*:*:*" ]
null
4
null
null
null
GHSA-4ccr-c6hg-r7x3
An integer overflow was addressed through improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution.
[]
null
7.8
null
null
null
RHSA-2025:0138
Red Hat Security Advisory: firefox security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
null
CVE-2005-2128
QUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.
[ "cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-g9cc-xw8r-hj44
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
[]
null
null
null
null
null
GHSA-3q8j-579q-jx44
The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case.An attacker may cause the reference count to overflow, leading to a use after free (UAF).
[]
null
7.7
null
null
null
CVE-2003-0216
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
[ "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-vxc7-mqp8-h5jr
Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
8.8
null
null
CVE-2006-2463
view_album.php in SelectaPix 1.31 and earlier allows remote attackers to obtain the installation path via a certain request, which displays the path in an error message, possibly due to an invalid or missing parameter.
[ "cpe:2.3:a:out_of_the_trees_web_design:selectapix:1.31:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2009-0970
PHP remote file inclusion vulnerability in includes/class_image.php in PHP Pro Bid 6.05, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the fileExtension parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:phpprobid:php_pro_bid:6.05:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-p594-hvv6-pr97
An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server.
[]
null
null
7.5
null
null
CVE-2017-16758
Cross-site scripting (XSS) vulnerability in admin/partials/uif-access-token-display.php in the Ultimate Instagram Feed plugin before 1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "access_token" parameter.
[ "cpe:2.3:a:ultimate_instagram_feed_project:ultimate_instagram_feed:*:*:*:*:*:wordpress:*:*" ]
null
null
4.8
3.5
null
CVE-2021-37672
Heap OOB in `SdcaOptimizerV2` in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples. We have patched the issue in GitHub commit a4e138660270e7599793fa438cd7b2fc2ce215a6. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2018-20776
Frog CMS 0.9.5 provides a directory listing for a /public request.
[ "cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-fppm-3x24-27q8
Format string vulnerability in Infodrom cfingerd 1.4.3 and earlier allows a remote attacker to gain additional privileges via a malformed ident reply that is passed to the syslog function.
[]
null
9.8
null
null
null
CVE-2019-15545
An issue was discovered in the libp2p-core crate before 0.8.1 for Rust. Attackers can spoof ed25519 signatures.
[ "cpe:2.3:a:libp2p:libp2p:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
RHSA-2023:6324
Red Hat Security Advisory: python3.11-pip security update
python: tarfile module directory traversal
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
null
CVE-2020-1107
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1104, CVE-2020-1105.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2021-1725
Bot Framework SDK Information Disclosure Vulnerability
Bot Framework SDK Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:.net_framework:*:*", "cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:javascript:*:*", "cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:python:*:*" ]
null
5.5
null
null
null
GHSA-gcj2-8cp7-j4jx
A security feature bypass vulnerability exists when the Microsoft Outlook attachment block filter does not properly handle attachments, aka "Microsoft Outlook Security Feature Bypass Vulnerability." This affects Microsoft Office.
[]
null
null
6.5
null
null
GHSA-p96g-c878-c43j
The Event List WordPress plugin before 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed
[]
null
4.8
null
null
null
CVE-2017-10604
Junos OS: SRX Series: Cluster configuration sync failures occur if the root user account is locked out
When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out. Administrators can confirm if the root account is locked out via the following command root@device> show system login lockout user root User Lockout start Lockout end root 1995-01-01 01:00:01 PDT 1995-11-01 01:31:01 PDT Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D65 on SRX series; 12.3X48 prior to 12.3X48-D45 on SRX series; 15.1X49 prior to 15.1X49-D75 on SRX series.
[ "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2000-0357
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
[ "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2015-3150
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
[ "cpe:2.3:a:redhat:automatic_bug_reporting_tool:-:*:*:*:*:*:*:*" ]
null
7.1
null
7.2
null
CVE-2021-28485
In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS web application allows relative path traversal via a specific parameter in the https request after authentication, which allows access to files on the system that are not intended to be accessible via the web application.
[ "cpe:2.3:o:ericsson:mobile_switching_center_server_bc_18a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ericsson:mobile_switching_center_server_bc_18a:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2024-39822
Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
[ "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*" ]
null
6.5
null
null
null
CVE-2023-0219
FluentSMTP < 2.2.3 - Stored XSS via Email Logs
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
[ "cpe:2.3:a:wpmanageninja:fluentsmtp:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-4xmw-cxj4-7pmf
A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device.
[]
null
null
9.8
null
null
CVE-2022-29305
imgurl v2.31 was discovered to contain a Blind SQL injection vulnerability via /upload/localhost.
[ "cpe:2.3:a:imgurl_project:imgurl:2.31:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
null
GHSA-p44r-3x7c-4h83
Server-Side Request Forgery (SSRF) vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.0.11.
[]
null
5.4
null
null
null
CVE-2022-20937
A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device. This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications. There are workarounds that address this vulnerability.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2016-9401
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
[ "cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.4:patch1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.4:patch2:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.4:patch3:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.4:patch4:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.4:patch5:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
6.2
null
2.1
null
GHSA-h686-wf4f-g3q9
cfnetwork.dll 1.450.5.0 in CFNetwork, as used by safari.exe 531.21.10 in Apple Safari 4.0.4 on Windows, allows remote attackers to cause a denial of service (application crash) via a long string in the SRC attribute of a (1) IMG or (2) IFRAME element.
[]
null
null
null
null
null
GHSA-pjpg-8wjw-xmv3
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792.
[]
null
null
9.8
null
null
CVE-2024-30218
Denial of service (DOS) vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
The ABAP Application Server of SAP NetWeaver as well as ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.
[]
null
6.5
null
null
null
CVE-2022-42478
An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.
[ "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2020-1148
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1289.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-h34q-7cxx-g6r9
IBM Rational Engineering Lifecycle Manager 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123187.
[]
null
null
5.4
null
null
GHSA-3f37-xrxw-857g
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly allocate memory, which allows remote attackers to cause a denial of service via a crafted (1) web site or (2) file, aka "Adobe Font Driver Denial of Service Vulnerability."
[]
null
null
null
null
null
CVE-2017-5219
An issue was discovered in SageCRM 7.x before 7.3 SP3. The Component Manager functionality, provided by SageCRM, permits additional components to be added to the application to enhance provided functionality. This functionality allows a zip file to be uploaded, containing a valid .ecf component file, which will be extracted to the inf directory outside of the webroot. By creating a zip file containing an empty .ecf file, to pass file-validation checks, any other file provided in zip file will be extracted onto the filesystem. In this case, a web shell with the filename '..\WWWRoot\CustomPages\aspshell.asp' was included within the zip file that, when extracted, traversed back out of the inf directory and into the SageCRM webroot. This permitted remote interaction with the underlying filesystem with the highest privilege level, SYSTEM.
[ "cpe:2.3:a:sagecrm:sagecrm:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:sagecrm:sagecrm:7.3:sp1:*:*:*:*:*:*", "cpe:2.3:a:sagecrm:sagecrm:7.3:sp2:*:*:*:*:*:*" ]
null
null
9.8
10
null