id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-9vx6-2r2f-g9qw
|
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
|
[] | null | null | null | null | null |
|
GHSA-p7f3-v9j2-h27r
|
H3C R3010 v100R002L02 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wjr7-x2gv-wqfh
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-0450
|
Buffer overflow in Talentsoft Web+ 5.0 and earlier allows remote attackers to execute arbitrary code via a long Web Markup Language (wml) file name to (1) webplus.dll or (2) webplus.exe.
|
[
"cpe:2.3:a:talentsoft:web\\+_server:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:talentsoft:web\\+_server:5.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xg26-2c9v-8r8w
|
An path traversal vulnerability leading to delete arbitrary files was discovered in BigFileAgent. Remote attackers can use this vulnerability to delete arbitrary files of unspecified number of users.
|
[] | null | null | null | null | null |
|
CVE-2022-27532
|
A maliciously crafted TIF file in Autodesk 3ds Max 2022 and 2021 can be used to write beyond the allocated buffer while parsing TIF files. This vulnerability in conjunction with other vulnerabilities could lead to arbitrary code execution.
|
[
"cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-78hj-7cr6-hq8q
|
In the Linux kernel, the following vulnerability has been resolved:iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAPgeneric/077 on x86_32 CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP=y with highmem,
on huge=always tmpfs, issues a warning and then hangs (interruptibly):WARNING: CPU: 5 PID: 3517 at mm/highmem.c:622 kunmap_local_indexed+0x62/0xc9
CPU: 5 UID: 0 PID: 3517 Comm: cp Not tainted 6.12.0-rc4 #2
...
copy_page_from_iter_atomic+0xa6/0x5ec
generic_perform_write+0xf6/0x1b4
shmem_file_write_iter+0x54/0x67Fix copy_page_from_iter_atomic() by limiting it in that case
(include/linux/skbuff.h skb_frag_must_loop() does similar).But going forward, perhaps CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is too
surprising, has outlived its usefulness, and should just be removed?
|
[] | null | 7.8 | null | null | null |
|
GHSA-w652-7vhj-7967
|
Incorrect bound check can lead to potential buffer overwrite in WLAN controller in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
|
[] | null | null | 7.8 | null | null |
|
GHSA-866h-pm2w-j493
|
A vulnerability in mintplex-labs/anything-llm prior to version 1.3.1 allows for path traversal due to improper handling of non-ASCII filenames in the multer library. This vulnerability can lead to arbitrary file write, which can subsequently result in remote code execution. The issue arises when the filename transformation introduces '../' sequences, which are not sanitized by multer, allowing attackers with manager or admin roles to write files to arbitrary locations on the server.
|
[] | null | null | 7.2 | null | null |
|
RHSA-2015:0843
|
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
|
openstack-nova: Nova network denial of service through API filtering openstack-nova: Nova VMware instance in resize state may leak openstack-nova: console Cross-Site WebSocket hijacking
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null | null |
GHSA-2g63-25fp-6g47
|
The FreeMind WP Browser plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.2. This is due to missing nonce protection on the FreemindOptions() function found in the ~/freemind-wp-browser.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
|
[] | null | 8.8 | null | null | null |
|
GHSA-f56w-wc87-frcc
|
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062.
|
[] | null | 4.1 | null | null | null |
|
CVE-2023-5771
|
HTML injection in AdminUI through email subject
|
Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages. This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.
|
[
"cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:-:*:*:*:*:*:*",
"cpe:2.3:a:proofpoint:enterprise_protection:8.20.0:-:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2007-4648
|
The nvcoaft51 driver in Norman Virus Control (NVC) 5.82 uses weak permissions (unrestricted write access) for the NvcOa device, which allows local users to gain privileges by (1) triggering a buffer overflow in a kernel pool via a string argument to ioctl 0xBF67201C; or by (2) sending a crafted KEVENT structure through ioctl 0xBF672028 to overwrite arbitrary memory locations.
|
[
"cpe:2.3:a:norman:norman_virus_control:5.82:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2011:1851
|
Red Hat Security Advisory: krb5 security update
|
krb5: telnet client and server encrypt_keyid heap-based buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2019-15525
|
There is Missing SSL Certificate Validation in the pw3270 terminal emulator before version 5.1.
|
[
"cpe:2.3:a:pw3270_project:pw3270:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 | null |
|
GHSA-37m5-593h-89wf
|
In Liferay Portal 6.1.0, the tags section has XSS via a Public Render Parameter (p_r_p) value, as demonstrated by p_r_p_564233524_tag.
|
[] | null | null | 6.1 | null | null |
|
GHSA-w396-ghph-9x2g
|
Actian Matrix 5.1.x through 5.1.2.4 and 5.2.x through 5.2.0.1 allows remote authenticated users to bypass intended write-access restrictions and execute an UPDATE statement by referencing a table.
|
[] | null | null | null | null | null |
|
CVE-2019-15021
|
A security vulnerability exists in the Zingbox Inspector versions 1.294 and earlier, that can allow an attacker to easily identify instances of Zingbox Inspectors in a local area network.
|
[
"cpe:2.3:a:zingbox:inspector:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2020-25868
|
Pexip Infinity 22.x through 24.x before 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can trigger a software abort (temporary loss of service).
|
[
"cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2016-7538
|
coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-vrm8-cj97-fqm4
|
The WooCommerce Add to Cart Custom Redirect plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'wcr_dismiss_admin_notice' function in all versions up to, and including, 1.2.13. This makes it possible for authenticated attackers, with contributor access and above, to update the values of arbitrary site options to 'dismissed'.
|
[] | null | 8.1 | null | null | null |
|
CVE-2024-44557
|
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.
|
[
"cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2023-20856
|
VMware vRealize Operations (vROps) contains a CSRF bypass vulnerability. A malicious user could execute actions on the vROps platform on behalf of the authenticated victim user.
|
[
"cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2012-4335
|
Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:samsung:net-i_viewer:1.37.120316:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-q2x3-j47p-f2ww
|
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters.
|
[] | null | 9.8 | null | null | null |
|
GHSA-3m52-hx3w-rfj4
|
PHP remote file inclusion vulnerability in index.php in eboli allows remote attackers to execute arbitrary PHP code via a URL in the contentSpecial parameter.
|
[] | null | null | null | null | null |
|
GHSA-crwp-2h3q-vwm3
|
Cross-Site Request Forgery (CSRF) vulnerability in Native Grid LLC A no-code page builder for beautiful performance-based content.This issue affects A no-code page builder for beautiful performance-based content: from n/a through 2.1.20.
|
[] | null | 4.3 | null | null | null |
|
CVE-2019-16755
|
BMC Remedy ITSM Suite is prone to unspecified vulnerabilities in both DWP and SmartIT components, which can permit remote attackers to perform pre-authenticated remote commands execution on the Operating System running the targeted application. Affected DWP versions: versions: 3.x to 18.x, all versions, service packs, and patches are affected by this vulnerability. Affected SmartIT versions: 1.x, 2.0, 18.05, 18.08, and 19.02, all versions, service packs, and patches are affected by this vulnerability.
|
[
"cpe:2.3:a:bmc:myit_digital_workplace:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2024-26688
|
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
|
In the Linux kernel, the following vulnerability has been resolved:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx->hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.
E.g: Taking the following steps:
fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
fsconfig(fd, FSCONFIG_SET_STRING, "pagesize", "1024", 0);
fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);
Given that the requested "pagesize" is invalid, ctxt->hstate will be replaced
with NULL, losing its previous value, and we will print an error:
...
...
case Opt_pagesize:
ps = memparse(param->string, &rest);
ctx->hstate = h;
if (!ctx->hstate) {
pr_err("Unsupported page size %lu MB\n", ps / SZ_1M);
return -EINVAL;
}
return 0;
...
...
This is a problem because later on, we will dereference ctxt->hstate in
hugetlbfs_fill_super()
...
...
sb->s_blocksize = huge_page_size(ctx->hstate);
...
...
Causing below Oops.
Fix this by replacing cxt->hstate value only when then pagesize is known
to be valid.
kernel: hugetlbfs: Unsupported page size 0 MB
kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028
kernel: #PF: supervisor read access in kernel mode
kernel: #PF: error_code(0x0000) - not-present page
kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0
kernel: Oops: 0000 [#1] PREEMPT SMP PTI
kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G E 6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f
kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017
kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0
kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 <8b> 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28
kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246
kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004
kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000
kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004
kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000
kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400
kernel: FS: 00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0
kernel: Call Trace:
kernel: <TASK>
kernel: ? __die_body+0x1a/0x60
kernel: ? page_fault_oops+0x16f/0x4a0
kernel: ? search_bpf_extables+0x65/0x70
kernel: ? fixup_exception+0x22/0x310
kernel: ? exc_page_fault+0x69/0x150
kernel: ? asm_exc_page_fault+0x22/0x30
kernel: ? __pfx_hugetlbfs_fill_super+0x10/0x10
kernel: ? hugetlbfs_fill_super+0xb4/0x1a0
kernel: ? hugetlbfs_fill_super+0x28/0x1a0
kernel: ? __pfx_hugetlbfs_fill_super+0x10/0x10
kernel: vfs_get_super+0x40/0xa0
kernel: ? __pfx_bpf_lsm_capable+0x10/0x10
kernel: vfs_get_tree+0x25/0xd0
kernel: vfs_cmd_create+0x64/0xe0
kernel: __x64_sys_fsconfig+0x395/0x410
kernel: do_syscall_64+0x80/0x160
kernel: ? syscall_exit_to_user_mode+0x82/0x240
kernel: ? do_syscall_64+0x8d/0x160
kernel: ? syscall_exit_to_user_mode+0x82/0x240
kernel: ? do_syscall_64+0x8d/0x160
kernel: ? exc_page_fault+0x69/0x150
kernel: entry_SYSCALL_64_after_hwframe+0x6e/0x76
kernel: RIP: 0033:0x7ffbc0cb87c9
kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48
kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af
kernel: RAX: fffffffffff
---truncated---
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-9jx7-jm7h-9c4w
|
Opera before 11.60 does not properly handle certificate revocation, which has unspecified impact and remote attack vectors related to "corner cases."
|
[] | null | null | null | null | null |
|
CVE-2020-12496
|
ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 2.x exposures sensitive information to an unauthorized actor
|
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
|
[
"cpe:2.3:o:endress:rsg35_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:endress:rsg35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:endress:rsg45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:endress:rsg45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:endress:orsg35_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:endress:orsg35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:endress:orsg45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:endress:orsg45:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-vjx8-8j32-57mf
|
On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the 'Allow NOTIFY From' configuration parameter when the db variable "dnsexpress.notifyport" is set to any value other than the default of "0".
|
[] | null | null | 3.7 | null | null |
|
CVE-2025-2524
|
Ninja Forms < 3.10.1 - Admin+ Stored XSS
|
The Ninja Forms WordPress plugin before 3.10.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
RHSA-2014:1002
|
Red Hat Security Advisory: rhevm security update
|
ovirt-engine-backend: memory snapshots not wiped when deleting a VM with wipe-after-delete (WAD) enabled for its disks
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null | null |
ICSA-22-167-07
|
Siemens SINEMA Remote Connect Server
|
Affected application is missing general HTTP security headers in the web server configured on port 443. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors. Affected application is missing general HTTP security headers in the web server configured on port 6220. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors.
|
[] | null | 4.2 | null | null | null |
GHSA-g63c-vcx9-r7j7
|
A Remote Code Execution vulnerability in HPE Network Automation using RPCServlet and Java Deserialization version v9.1x, v9.2x, v10.00, v10.00.01, v10.00.02, v10.10, v10.11, v10.11.01, v10.20 was found.
|
[] | null | null | 9.8 | null | null |
|
CVE-2021-21448
|
SAP GUI for Windows, version - 7.60, allows an attacker to spoof logon credentials for Application Server ABAP backend systems in the client PCs memory. Under certain conditions the attacker can access information which would otherwise be restricted. The exploit can only be executed locally on the client PC and not via Network and the attacker needs at least user authorization of the Operating System user of the victim.
|
[
"cpe:2.3:a:sap:graphical_user_interface:7.60:*:*:*:*:windows:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2014-2472
|
Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5.0 and 5.1 allows remote attackers to affect availability via vectors related to SGD Proxy Server (ttaauxserv), a different vulnerability than CVE-2014-2474, CVE-2014-2476, and CVE-2014-6459.
|
[
"cpe:2.3:a:oracle:virtualization:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-5116
|
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG filters.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-r89j-f3jf-r787
|
MISP 2.4.136 has XSS via galaxy cluster element values to app/View/GalaxyElements/ajax/index.ctp. Reference types could contain javascript: URLs.
|
[] | null | null | null | null | null |
|
CVE-2012-2399
|
Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFupload 2.2.0.1 and earlier, as used in WordPress before 3.5.2, TinyMCE Image Manager 1.1 and earlier, and other products allows remote attackers to inject arbitrary web script or HTML via the buttonText parameter, a different vulnerability than CVE-2012-3414.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2009:1646
|
Red Hat Security Advisory: libtool security update
|
libtool: libltdl may load and execute code from a library in the current directory
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2024-39313
|
toy-blog Improper Input Validation vulnerability
|
toy-blog is a headless content management system implementation. Starting in version 0.5.4 and prior to version 0.6.1, articles with private visibility can be read if the reader does not set credentials for the request. Users should upgrade to 0.6.1 or later to receive a patch. No known workarounds are available.
|
[] | null | 6.5 | null | null | null |
CVE-2021-24693
|
Simple Download Monitor < 3.9.5 - Contributor+ Stored Cross-Site Scripting via File Thumbnail
|
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
|
[
"cpe:2.3:a:tipsandtricks-hq:simple_download_monitor:*:*:*:*:*:wordpress:*:*"
] | null | 9 | null | 6 | null |
GHSA-922w-j4x2-xfvv
|
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
|
[] | null | null | null | null | null |
|
GHSA-348m-h4rf-cr2v
|
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 use default credentials admin/admin and moderator/moderator for the web interface. An unauthenticated, remote attacker can use these credentials to gain privileged access to the device.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-28386
|
An issue was discovered in certain Verbatim drives through 2022-03-31. The security feature for lockout (e.g., requiring a reformat of the drive after 20 failed unlock attempts) does not work as specified. More than 20 attempts may be made. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428 and Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0.
|
[
"cpe:2.3:o:verbatim:keypad_secure_usb_3.2_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:keypad_secure_usb_3.2_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:verbatim:gd25lk01-3637-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:gd25lk01-3637-c:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 | null |
|
CVE-2014-6096
|
Cross-site scripting (XSS) vulnerability in IBM Security Identity Manager 6.x before 6.0.0.3 IF14 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:security_identity_manager:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager:6.0.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-v5f5-778p-qh56
|
A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.
|
[] | null | 7.5 | null | null | null |
|
GHSA-5rmh-f225-qfjh
|
In NCH Express Invoice 7.25, an authenticated low-privilege user can enter a crafted URL to access higher-privileged functionalities such as the "Add New Item" screen.
|
[] | null | null | null | null | null |
|
GHSA-3xq4-4ccf-wf58
|
Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
|
[] | null | null | null | null | null |
|
RHSA-2018:0303
|
Red Hat Security Advisory: erlang security and bug fix update
|
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
|
[
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 6.5 | null | null |
RHSA-2015:2670
|
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null | null |
CVE-2015-0616
|
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819.
|
[
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:9.1\\(2\\):*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
GHSA-8v8r-x32q-hgrq
|
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the MergeRecords module by a Developer user.
|
[] | null | null | null | null | null |
|
CVE-2019-8254
|
Adobe Photoshop CC versions before 20.0.8 and 21.0.x before 21.0.2 have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2025-2232
|
Realteo - Real Estate Plugin by Purethemes <= 1.2.8 - Authentication Bypass via 'do_register_user'
|
The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to insufficient role restrictions in the 'do_register_user' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.
|
[] | null | 9.8 | null | null | null |
GHSA-qx77-6fv2-rf7p
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeHigh Checkout Field Editor for WooCommerce (Pro) allows Functionality Misuse, File Manipulation.This issue affects Checkout Field Editor for WooCommerce (Pro): from n/a through 3.6.2.
|
[] | null | 8.6 | null | null | null |
|
CVE-2015-1444
|
Multiple cross-site scripting (XSS) vulnerabilities in the web administration frontend in the httpd package in fli4l before 3.10.1 and 4.0 before 2015-01-30 allow remote attackers to inject arbitrary web script or HTML via the (1) conntrack.cgi, (2) index.cgi, (3) log_syslog.cgi, (4) problems.cgi, (5) status.cgi, (6) status_network.cgi, or (7) status_system.cgi script in admin/.
|
[
"cpe:2.3:o:fli4l:fli4l:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fli4l:fli4l:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2012-3206
|
Unspecified vulnerability in the Integrated Lights Out Manager CLI in Oracle Sun Products Suite SysFW 8.2.0.a for SPARC and Netra SPARC T3 and T4-based servers, and other versions and servers, allows local users to affect confidentiality via unknown vectors.
|
[
"cpe:2.3:o:oracle:sun_products_suite_sysfw:8.2.0.a:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t3-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t3-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-2b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-4:-:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-fxmg-2c5f-xhvq
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | 5.5 | null | null |
|
CVE-2025-8758
|
TRENDnet TEW-822DRE vsftpd least privilege violation
|
A vulnerability was found in TRENDnet TEW-822DRE FW103B02. It has been classified as problematic. This affects an unknown part of the component vsftpd. The manipulation leads to least privilege violation. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 7.3 | 7 | 7 | 6 | null |
GHSA-j44q-j7m5-pf6h
|
Cross-site request forgery (CSRF) vulnerability in adm/admin_edit.php in PHPDug 2.0.0 allows remote attackers to hijack the authentication of administrators for requests that modify credentials.
|
[] | null | null | null | null | null |
|
CVE-2022-45469
|
Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:unison_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | 2.2 | null | null | null |
|
GHSA-fc3x-69ww-xrw6
|
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.
|
[] | null | null | null | null | null |
|
RHSA-2007:1017
|
Red Hat Security Advisory: samba security update
|
samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-5gfj-9xr7-9j5r
|
The affix_sock_register in the Affix Bluetooth Protocol Stack for Linux might allow local users to gain privileges via a socket call with a negative protocol value, which is used as an array index.
|
[] | null | null | null | null | null |
|
CVE-2004-1799
|
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.
|
[
"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jm5w-96w4-8pcq
|
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
|
[] | null | 2.7 | null | null | null |
|
GHSA-jp59-43f6-w2j5
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of the Adobe graphics module responsible for displaying textual data. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
|
[] | null | null | 8.8 | null | null |
|
GHSA-6xm7-697g-2qwf
|
Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format.
|
[] | null | null | null | null | null |
|
GHSA-44jj-9jpw-493g
|
SQL injection vulnerability in modules/blog/index.php in AneCMS Blog 1.3 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO.
|
[] | null | null | null | null | null |
|
CVE-2023-36829
|
Sentry CORS misconfiguration vulnerability
|
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.
|
[
"cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*",
"cpe:2.3:a:functional:sentry:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
GHSA-pg8c-8fmq-494r
|
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.
|
[] | null | null | null | null | null |
|
CVE-2009-4958
|
SQL injection vulnerability in video.php in EMO Breeder Manager (aka EMO Breader Manager) allows remote attackers to execute arbitrary SQL commands via the idd parameter.
|
[
"cpe:2.3:a:emophp:emo_breeder_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-21340
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17.0.1:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-j3ff-xp6c-6gcc
|
Failure to validate signature during handshake
|
Impact`@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process.
This may allow a man-in-the-middle to pose as other peers and get those peers banned.PatchesUsers should upgrade to 4.1.2 or 5.0.3WorkaroundsNo workarounds, just patch upgradeReferenceshttps://github.com/ChainSafe/js-libp2p-noise/pull/130
|
[] | null | 8.1 | null | null | null |
CVE-2019-19882
|
shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).
|
[
"cpe:2.3:a:shadow_project:shadow:4.8:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 | null |
|
CVE-2022-25318
|
An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.
|
[
"cpe:2.3:a:cerebrate-project:cerebrate:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2022-3789
|
Tim Campus Confession Wall share.php sql injection
|
A vulnerability has been found in Tim Campus Confession Wall and classified as critical. Affected by this vulnerability is an unknown functionality of the file share.php. The manipulation of the argument post_id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212611.
|
[
"cpe:2.3:a:tim_campus_confession_wall_project:tim_campus_confession_wall:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-9pwg-54q3-m94v
|
The management console on the Symantec Web Gateway (SWG) appliance before 5.1.1 has an incorrect sudoers file, which allows local users to bypass intended access restrictions via a command.
|
[] | null | null | null | null | null |
|
GHSA-57cp-r273-mcmf
|
This issue was addressed through improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen.
|
[] | null | 2.4 | null | null | null |
|
GHSA-353g-x49j-hjg7
|
WTF/wtf/FastBitVector.h in WebKit, as distributed in Safari Technology Preview Release 46, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because it calls the FastBitVectorWordOwner::resizeSlow function (in WTF/wtf/FastBitVector.cpp) for a purpose other than initializing a bitvector size, and resizeSlow mishandles cases where the old array length is greater than the new array length.
|
[] | null | null | 9.8 | null | null |
|
GHSA-rv52-jqj3-929g
|
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-22288
|
Improper authorization vulnerability in Galaxy Store prior to 4.5.36.5 allows remote app installation of the allowlist.
|
[
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-7276
|
itsourcecode Alton Management System member_save.php sql injection
|
A vulnerability has been found in itsourcecode Alton Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/member_save.php. The manipulation of the argument last/first leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273145 was assigned to this vulnerability.
|
[
"cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 | null |
RHSA-2005:261
|
Red Hat Security Advisory: glibc security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2005-4770
|
SQL injection vulnerability in an unspecified Accelerated Enterprise Solutions product, possibly Accelerated E Solutions, allows remote attackers to execute arbitrary SQL commands via the password parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:accelerated_enterprise_solutions:accelerated_e_solutions:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-7vpq-xcrf-9qvc
|
In hwservicemanager, there is a possible out of bounds write due to freeing a wild pointer. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155646800
|
[] | null | null | null | null | null |
|
CVE-2016-3040
|
IBM WebSphere Application Server (WAS) Liberty, as used in IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8, allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[
"cpe:2.3:a:ibm:security_privileged_identity_manager_virtual_appliance:2.0:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 | null |
|
GHSA-mf2w-j66c-qcm9
|
In JetBrains YouTrack before 2024.2.34646 the Guest User Account was enabled for attaching files to articles
|
[] | null | 4.3 | null | null | null |
|
CVE-2020-15649
|
Given an installed malicious file picker application, an attacker was able to steal and upload local files of their choosing, regardless of the actually files picked. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.11.
|
[
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-wq6r-632p-gxr2
|
The mintToken function of a smart contract implementation for CGCToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
CVE-2005-4468
|
PHP remote file include vulnerability in help_text_vars.php in PHPGedView 3.3.7 and earlier allows remote attackers to execute arbitrary code via a URL in the PGV_BASE_DIRECTORY parameter.
|
[
"cpe:2.3:a:phpgedview:phpgedview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.52.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.61.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.65.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.65.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgedview:phpgedview:2.65_beta5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-9378
|
YML for Yandex Market <= 4.7.2 - Reflected Cross-Site Scripting
|
The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 4.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:icopydoc:yml_for_yandex_market:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2019-5245
|
HiSuite 9.1.0.300 versions and earlier contains a DLL hijacking vulnerability. This vulnerability exists due to some DLL file is loaded by HiSuite improperly. And it allows an attacker to load this DLL file of the attacker's choosing that could execute arbitrary code.
|
[
"cpe:2.3:a:huawei:hisuite:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 | null |
|
CVE-2015-5198
|
libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
|
[
"cpe:2.3:a:libvdpau_project:libvdpau:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2023-42081
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21878.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.0.1.371:*:*:*:*:*:*:*",
"cpe:2.3:a:pdf-xchange:pdf-tools:10.0.1.371:*:*:*:*:*:*:*",
"cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.0.1.371:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
GHSA-hm46-4hjh-p78w
|
Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.