id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-pfrh-m7rq-gq4c
|
A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.
|
[] | null | 7.2 | null | null | null |
|
RHSA-2005:782
|
Red Hat Security Advisory: util-linux and mount security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-348f-xf8c-h3v7
|
A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00471994 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_base_set in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-57055
|
Server-Side Access Control Bypass vulnerability in WombatDialer before 25.02 could allow unauthorized users to potentially call certain services without the necessary access level. This issue is limited to services used by the client (not the general-use JSON services) and requires reverse engineering of the proprietary serialization protocol, making it difficult to exploit.
|
[] | null | 5 | null | null | null |
|
GHSA-xhg3-p7wr-4hrx
|
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9h5h-3fg4-h7h3
|
Indeo Otter through 1.7.4 mishandles a "</script>" substring in an initial DP payload, which allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact, as demonstrated by the Plan Editor.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-1624
|
Latest Tweets Widget <= 1.1.4 - Arbitrary Settings Update via CSRF
|
The Latest Tweets Widget WordPress plugin through 1.1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
[
"cpe:2.3:a:latest_tweets_widget_project:latest_tweets_widget:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4.3 | null |
CVE-2023-1822
|
Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-h83w-cjpq-fcvj
|
Buffer overflow in Race Driver 1.20 and earlier allows remote attackers to cause a denial of service (application crash) via a long (1) nickname or (2) chat message.
|
[] | null | null | null | null | null |
|
RHSA-2019:3219
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null | null |
CVE-2013-1715
|
Multiple untrusted search path vulnerabilities in the (1) full installer and (2) stub installer in Mozilla Firefox before 23.0 on Windows allow local users to gain privileges via a Trojan horse DLL in the default downloads directory. NOTE: this issue exists because of an incomplete fix for CVE-2012-4206.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2021-37049
|
There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-h75v-f2c8-xr3q
|
Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
|
[] | null | null | null | null | null |
|
CVE-2018-18988
|
LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening a specially crafted report format file. This may allow remote code execution, data exfiltration, or cause a system crash.
|
[
"cpe:2.3:a:lcds:laquis_scada:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 8.3 | null |
|
GHSA-5pf7-r489-5rgm
|
The Symantec Messaging Gateway can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process.
|
[] | null | null | 10 | null | null |
|
GHSA-qwpv-qx8g-5fqm
|
A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account's password.
|
[] | null | null | null | null | null |
|
CVE-2024-22807
|
An issue in Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 allows attackers to erase a critical sector of the flash memory, causing the machine to lose network connectivity and suffer from firmware corruption.
|
[
"cpe:2.3:a:tormach:pilotpath_controller:2.9.6:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2019-15952
|
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
|
[
"cpe:2.3:a:totaljs:total.js_cms:12.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-mmfq-r3rg-8r7w
|
ChakraCore RCE Vulnerability
|
The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," as demonstrated by the Chakra JavaScript engine, a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
|
[] | null | null | 7.5 | null | null |
GHSA-49c2-3ppg-7626
|
This issue tracks two CWE-416 Use After Free (UAF) and one CWE-415 Double Free vulnerabilities in Goahead versions <= 6.0.0. These are caused by JST values not being nulled when freed during parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is enabled, a remote attacker with the privileges to modify JavaScript template (JST) files could exploit this by providing malicious templates. This may lead to memory corruption, potentially causing a Denial of Service (DoS) or, in rare cases, code execution, though the latter is highly context-dependent.
|
[] | null | 5.9 | null | null | null |
|
GHSA-v53j-5xg5-wr7x
|
WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
|
[] | null | null | 6.1 | null | null |
|
RHSA-2018:3096
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: AIO write triggers integer overflow in some protocols kernel: Information leak when handling NM entries containing NUL kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation kernel: Handling of might_cancel queueing is not properly pretected against race kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service kernel: Mishandling mutex within libsas allowing local Denial of Service kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption kernel: Denial of service in resv_map_release function in mm/hugetlb.c kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function kernel: MIDI driver race condition leads to a double-free kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.8 | null | null |
CVE-2018-19492
|
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
|
[
"cpe:2.3:a:gnuplot:gnuplot:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-vqmf-2wfc-j383
|
Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo allows a remote attacker to execute arbitrary code via the Delete Account and Deactivate functions.
|
[] | null | 8.8 | null | null | null |
|
CVE-2023-52831
|
cpu/hotplug: Don't offline the last non-isolated CPU
|
In the Linux kernel, the following vulnerability has been resolved:
cpu/hotplug: Don't offline the last non-isolated CPU
If a system has isolated CPUs via the "isolcpus=" command line parameter,
then an attempt to offline the last housekeeping CPU will result in a
WARN_ON() when rebuilding the scheduler domains and a subsequent panic due
to and unhandled empty CPU mas in partition_sched_domains_locked().
cpuset_hotplug_workfn()
rebuild_sched_domains_locked()
ndoms = generate_sched_domains(&doms, &attr);
cpumask_and(doms[0], top_cpuset.effective_cpus, housekeeping_cpumask(HK_FLAG_DOMAIN));
Thus results in an empty CPU mask which triggers the warning and then the
subsequent crash:
WARNING: CPU: 4 PID: 80 at kernel/sched/topology.c:2366 build_sched_domains+0x120c/0x1408
Call trace:
build_sched_domains+0x120c/0x1408
partition_sched_domains_locked+0x234/0x880
rebuild_sched_domains_locked+0x37c/0x798
rebuild_sched_domains+0x30/0x58
cpuset_hotplug_workfn+0x2a8/0x930
Unable to handle kernel paging request at virtual address fffe80027ab37080
partition_sched_domains_locked+0x318/0x880
rebuild_sched_domains_locked+0x37c/0x798
Aside of the resulting crash, it does not make any sense to offline the last
last housekeeping CPU.
Prevent this by masking out the non-housekeeping CPUs when selecting a
target CPU for initiating the CPU unplug operation via the work queue.
|
[] | null | null | null | null | null |
GHSA-prgj-h7jq-7p9h
|
The cryptocurrency wallet entropy seeding mechanism used in Libbitcoin Explorer 3.0.0 through 3.6.0 is weak, aka the Milk Sad issue. The use of an mt19937 Mersenne Twister PRNG restricts the internal entropy to 32 bits regardless of settings. This allows remote attackers to recover any wallet private keys generated from "bx seed" entropy output and steal funds. (Affected users need to move funds to a secure new cryptocurrency wallet.) NOTE: the vendor's position is that there was sufficient documentation advising against "bx seed" but others disagree. NOTE: this was exploited in the wild in June and July 2023.
|
[] | null | 7.5 | null | null | null |
|
GHSA-2w5c-3r2r-96jc
|
The Taxonomy Chain Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's pn_chain_menu shortcode in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-q6mp-x5x6-vgmf
|
Sage X3 Unauthenticated Remote Command Execution (RCE) as SYSTEM in AdxDSrv.exe component. By editing the client side authentication request, an attacker can bypass credential validation. While exploiting this does require knowledge of the installation path, that information can be learned by exploiting CVE-2020-7387. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 including Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & Payroll Version 9 (those components that ship with Syracuse 9.24.1.3), Version 11 (components shipped with Syracuse 11.25.2.6 and later), and Version 12 (components shipped with Syracuse 12.10.2.8 and later) of Sage X3. Other on-premises versions of Sage X3 are unsupported by the vendor.
|
[] | null | null | null | null | null |
|
GHSA-jgmw-q22m-j3r4
|
The GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace function in graphicsstack.h in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
|
[] | null | null | 5.5 | null | null |
|
CVE-2008-5797
|
SQL injection vulnerability in the advCalendar extension 0.3.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:typo3:advcalendar_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-fjcg-55pq-vx59
|
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
|
[] | null | 9.8 | null | null | null |
|
GHSA-p4r9-p3jm-cp84
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
|
[] | null | 7.8 | null | null | null |
|
GHSA-6h5v-qx9v-rhr2
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | null | null | null |
|
CVE-2019-13465
|
An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. ROS_ASSERT_MSG only works when ROS_ASSERT_ENABLED is defined. This leads to a problem in the remove() function in clients/roscpp/src/libros/spinner.cpp. When ROS_ASSERT_ENABLED is not defined, the iterator loop will run out of the scope of the array, and cause denial of service for other components (that depend on the communication-related functions of this package). NOTE: The reporter of this issue now believes it was a false alarm.
|
[
"cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | 5 | null |
|
GHSA-cp6x-wm76-3j63
|
The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.
|
[] | null | null | null | null | null |
|
GHSA-99r9-v28w-9qr9
|
DomainMOD through 4.11.01 has XSS via the assets/add/registrar.php notes field for the Registrar.
|
[] | null | null | 4.8 | null | null |
|
GHSA-2qqj-jhhr-px8r
|
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2012-2098
|
Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
|
[
"cpe:2.3:a:apache:commons_compress:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-25631
|
denylist of executable filename extensions possible to bypass under windows
|
In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type.
|
[
"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
GHSA-2c5c-fhr8-pwh9
|
Jenkins AppSpider Plugin missing permission check
|
Jenkins AppSpider Plugin 1.0.15 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.AppSpider Plugin 1.0.16 requires POST requests and Overall/Administer permission for the affected form validation method.
|
[] | null | 4.3 | null | null | null |
GHSA-h97p-7xw5-8jqw
|
Buffer overflow in catmail for ListProc 8.2.09 and earlier allows remote attackers to execute arbitrary code via a long ULISTPROC_UMASK value.
|
[] | null | null | null | null | null |
|
CVE-2023-40359
|
xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature.
|
[
"cpe:2.3:a:invisible-island:xterm:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-8x43-c958-qqx4
|
A vulnerability in Fibaro Motion Sensor firmware v3.4 allows attackers to cause a Denial of Service (DoS) via a crafted Z-Wave message.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-21250
|
An issue was discovered in Mattermost Server before 5.2.2, 5.1.2, and 4.10.4. It allows remote attackers to cause a denial of service (memory consumption) via crafted image dimensions.
|
[
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2014-4808
|
Unspecified vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0 through 7.0.0.2 CF28, 8.0 through 8.0.0.1 CF14, and 8.5.0 before CF03 allows remote authenticated users to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-c9vc-847w-w9p5
|
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2025-26984
|
WordPress SMS Alert Order Notifications – WooCommerce plugin <= 3.7.8 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozy Vision SMS Alert Order Notifications – WooCommerce allows Reflected XSS. This issue affects SMS Alert Order Notifications – WooCommerce: from n/a through 3.7.8.
|
[] | null | 7.1 | null | null | null |
CVE-2016-3606
|
Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
|
[
"cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
] | null | null | 9.6 | 6.8 | null |
|
GHSA-4223-wcr9-hvjq
|
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R6700v3 before 1.0.4.98, R6400v2 before 1.0.4.98, R7000 before 1.0.11.106, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.26, R7850 before 1.0.5.60, R8000 before 1.0.4.58, RS400 before 1.5.0.48, R6400 before 1.0.1.62, R6700 before 1.0.2.16, R6900 before 1.0.2.16, MK60 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, CBR40 before 2.5.0.10, R8000P before 1.4.1.62, R7960P before 1.4.1.62, R7900P before 1.4.1.62, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, EX7500 before 1.0.0.68, EAX80 before 1.0.1.62, EAX20 before 1.0.0.36, RBK752 before 3.2.16.6, RBK753 before 3.2.16.6, RBK753S before 3.2.16.6, RBK754 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBK853 before 3.2.16.6, RBK854 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6850 before 1.1.0.76, R6350 before 1.1.0.76, R6330 before 1.1.0.76, D7800 before 1.0.1.58, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK40 before 2.6.1.36, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK23 before 2.6.1.36, RBR20 before 2.6.1.38, RBS20 before 2.6.1.38, RBK12 before 2.6.1.44, RBK13 before 2.6.1.44, RBK14 before 2.6.1.44, RBK15 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, R6800 before 1.2.0.72, R6900v2 before 1.2.0.72, R6700v2 before 1.2.0.72, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, R7800 before 1.0.2.74, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, XR450 before 2.3.2.66, XR500 before 2.3.2.66, XR700 before 1.0.1.34, and XR300 before 1.0.3.50.
|
[] | null | null | null | null | null |
|
CVE-2025-20072
|
Mobile crash via improper validation of proto style in attachments
|
Mattermost Mobile versions <= 2.22.0 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the mobile via crafted malicious input.
|
[] | null | 6.5 | null | null | null |
GHSA-pvcx-grh4-qwx5
|
Missing Authorization vulnerability in theDotstore Minimum and Maximum Quantity for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Minimum and Maximum Quantity for WooCommerce: from n/a through 2.0.0.
|
[] | null | 4.3 | null | null | null |
|
GHSA-hvv7-ccqx-87f7
|
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02, any authenticated user was able to edit dmr_content objects; now any authenticated user may delete a dmr_content object and then create a new one with the old identifier) by authenticated users; this allows any authenticated user to replace the content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.
|
[] | null | null | 8.8 | null | null |
|
GHSA-c45w-p293-7cv6
|
Magento 2 Community Edition XSS Vulnerability
|
A stored cross-cite scripting vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to modify currency symbols can inject malicious javascript.
|
[] | null | null | 5.4 | null | null |
CVE-2017-2184
|
Buffer overflow in HOME SPOT CUBE2 firmware V101 and earlier allows an attacker to execute arbitrary code via WebUI.
|
[
"cpe:2.3:o:kddi:home_spot_cube_2_firmware:v100:*:*:*:*:*:*:*",
"cpe:2.3:o:kddi:home_spot_cube_2_firmware:v101:*:*:*:*:*:*:*",
"cpe:2.3:h:kddi:home_spot_cube_2:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 | null |
|
CVE-2024-53150
|
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors. That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.
For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal. When the descriptor
length is shorter than expected, it's skipped in the loop.
For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-9hcf-78cf-xwqv
|
The Social Share Buttons for WordPress plugin through 2.7 allows an unauthenticated user to upload arbitrary images and change the path where they are uploaded
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-9824
|
ImagePress - Image Gallery <= 1.2.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion and Post Title Update
|
The ImagePress – Image Gallery plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'ip_delete_post' and 'ip_update_post_title' functions in all versions up to, and including, 1.2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts and update post titles.
|
[] | null | 4.3 | null | null | null |
CVE-2018-12336
|
Undocumented Factory Backdoor in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows the vendor to extract confidential information via remote root SSH access.
|
[
"cpe:2.3:o:ecos:secure_boot_stick_firmware:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:h:ecos:secure_boot_stick:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2008-0238
|
Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-6577
|
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.
|
[
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-wxcg-59h3-c62v
|
Cross-site scripting (XSS) vulnerability in index.php in emlog version <= pro-1.0.7 allows remote attackers to inject arbitrary web script or HTML via the s parameter.
|
[] | null | null | null | null | null |
|
GHSA-38h6-wxxg-2c7g
|
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
|
[] | null | null | null | null | null |
|
CVE-2007-6266
|
Multiple SQL injection vulnerabilities in bcoos 1.0.10 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the gid parameter to modules/arcade/index.php in a show_stats action, or the lid parameter to (2) modules/myalbum/ratephoto.php or (3) modules/mylinks/ratelink.php, different vectors than CVE-2007-5104.
|
[
"cpe:2.3:a:bcoos:bcoos:1.0.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-8621
|
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows Server 2012, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8477, CVE-2018-8622.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
CVE-2009-0264
|
Buffer overflow in the Registry Setting Tool in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier has unknown impact and attack vectors.
|
[
"cpe:2.3:a:fujitsu:systemcastwizard_lite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:systemcastwizard_lite:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:systemcastwizard_lite:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:systemcastwizard_lite:1.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:systemcastwizard_lite:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:systemcastwizard_lite:2.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-56706
|
s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex
|
In the Linux kernel, the following vulnerability has been resolved:
s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex
Reservation of the PMU hardware is done at first event creation
and is protected by a pair of mutex_lock() and mutex_unlock().
After reservation of the PMU hardware the memory
required for the PMUs the event is to be installed on is
allocated by allocate_buffers() and alloc_sampling_buffer().
This done outside of the mutex protection.
Without mutex protection two or more concurrent invocations of
perf_event_init() may run in parallel.
This can lead to allocation of Sample Data Blocks (SDBs)
multiple times for the same PMU.
Prevent this and protect memory allocation of SDBs by
mutex.
|
[] | null | null | null | null | null |
GHSA-rx7r-r3h4-3r66
|
Windows MSHTML Platform Remote Code Execution Vulnerability
|
[] | null | 8.1 | null | null | null |
|
ICSA-19-274-03
|
Moxa EDR 810 Series
|
An authenticated attacker may abuse the ping feature to execute unauthorized commands on the router, which could allow an attacker to perform remote code execution.CVE-2019-10969 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). An unauthenticated attacker may be able to retrieve some log files from the device, which may allow sensitive information disclosure. Log files must have previously been exported by a legitimate user.CVE-2019-10963 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
|
[] | null | null | 4.3 | null | null |
GHSA-4hfv-g3hm-82x2
|
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-53350
|
Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.
|
[] | null | 7.4 | null | null | null |
|
GHSA-f5x8-55gx-hm4v
|
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[] | null | null | 9.8 | null | null |
|
GHSA-c645-h8hj-wvjj
|
Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2013-2152
|
Unquoted Windows search path vulnerability in the SPICE service, as used in Red Hat Enterprise Virtualization (RHEV) 3.2, allows local users to gain privileges via a crafted application in an unspecified folder.
|
[
"cpe:2.3:a:redhat:enterprise_virtualization:3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2021-33196
|
In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
|
[
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2021-32286
|
An issue was discovered in hcxtools through 6.1.6. A global-buffer-overflow exists in the function pcapngoptionwalk located in hcxpcapngtool.c. It allows an attacker to cause code Execution.
|
[
"cpe:2.3:a:hcxtools_project:hcxtoold:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2024-36151
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, as the victim needs to visit a web page with a maliciously crafted script.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2019-12278
|
Opera through 53 on Android allows Address Bar Spoofing. Characters from several languages are displayed in Right-to-Left order, due to mishandling of several Unicode characters. The rendering mechanism, in conjunction with the "first strong character" concept, may improperly operate on a numerical IP address or an alphabetic string, leading to a spoofed URL.
|
[
"cpe:2.3:a:opera:opera:52.1.2517.139570:*:*:*:*:android:*:*"
] | null | 4.3 | null | 4.3 | null |
|
GHSA-33v7-x483-jjjx
|
An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
|
[] | null | null | 9.1 | null | null |
|
RHSA-2024:3402
|
Red Hat Security Advisory: mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2020-28371
|
An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[
"cpe:2.3:a:readytalk:avian:1.2.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHBA-2025:14817
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.19.10 packages update
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/a:redhat:openshift:4.19::el9"
] | null | 5.4 | null | null | null |
CVE-2010-3763
|
Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303.
|
[
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-xx52-9m5j-pp7h
|
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginAction.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-7r3q-7qg9-2hg7
|
A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | null | 9.8 | null | null | null |
|
GHSA-rw79-5p9f-842m
|
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
|
[] | null | null | null | null | null |
|
GHSA-h3mx-pc7w-4qh2
|
In sms_GetTpPiIe of sms_PduCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-253770924References: N/A
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-26091
|
The frp_form_answers (aka Forms Export) extension before 3.1.2, and 4.x before 4.0.2, for TYPO3 allows XSS via saved emails.
|
[
"cpe:2.3:a:frappant:forms_export:*:*:*:*:*:typo3:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-69ch-324r-wxh6
|
Butterfly Button plugin may leave traces of its use on user's device. Since it is used for reporting domestic problems, this may lead to spouse knowing about its use.
|
[] | null | 4.6 | null | null | null |
|
CVE-2020-6069
|
An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG jpegread precision parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
|
[
"cpe:2.3:a:accusoft:imagegear:19.5.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
|
GHSA-hh5q-529x-q322
|
The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2008-1423
|
Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
|
[
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:1.2.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2025-46574
|
ZTE GoldenDB Database product has an input validation vulnerability
|
There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.
|
[] | null | 4.1 | null | null | null |
GHSA-w6gr-v7vh-5878
|
Cross-site scripting (XSS) vulnerability in themes/_unstyled/templates/init.vm in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the Greeting field in a User Profile.
|
[] | null | null | null | null | null |
|
CVE-2020-25713
|
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
|
[
"cpe:2.3:a:librdf:raptor_rdf_syntax_library:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2025-9507
|
itsourcecode Apartment Management System visitor_info.php sql injection
|
A weakness has been identified in itsourcecode Apartment Management System 1.0. Impacted is an unknown function of the file /report/visitor_info.php. Executing manipulation of the argument vid can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-27142
|
Pre-authenticated XXE injection
|
Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL.
|
[] | null | 5.9 | null | null | null |
GHSA-346w-fp78-57q5
|
A Stored Cross Site Scripting vulnerability has been found in UltimatePOS by UltimateFosters. This vulnerability is due to the lack of proper validation of user inputs via ‘/products/<PRODUCT_ID>/edit’, affecting to ‘name’ parameter via POST. The vulnerability could allow a remote attacker to send a specially crafted query to an authenticated user and steal his/her session cookies details.
|
[] | 5.1 | null | null | null | null |
|
GHSA-2cx4-vf7f-fxv5
|
Cross-site scripting (XSS) vulnerability in the administration panel in bBlog 0.7.2 allows remote authenticated users with superuser privileges to inject arbitrary web script or HTML via a blog name ($blogname). NOTE: if administrators are normally allowed to add HTML by other means, e.g. through Smarty templates, then this issue would not give any additional privileges, and thus would not be considered a vulnerability.
|
[] | null | 4.8 | null | null | null |
|
GHSA-vvv9-8h6r-hqf7
|
Tenda A18 V15.13.07.09 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2023:4420
|
Red Hat Security Advisory: OpenShift Virtualization 4.12.5 RPMs security and bug fix update
|
golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:container_native_virtualization:4.12::el7",
"cpe:/a:redhat:container_native_virtualization:4.12::el8"
] | null | 8.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.