id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-v979-hwcx-2v6g
Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry.
[]
null
null
null
null
CVE-2022-43392
A buffer overflow vulnerability in the parameter of web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted authorization request.
[ "cpe:2.3:o:zyxel:lte3301-plus_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte5388-m804_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte5398-m904_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7240-m403_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7461-m602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7461-m602:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7480-s905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7480-s905:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7485-s905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7485-s905:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:lte7490-m904_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nebula_lte7461-m602_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nebula_lte7461-m602:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nebula_nr5101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nebula_nr5101:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nr5101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nr5101:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:dx3301-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:dx4510-b1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:dx4510-b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:dx5401-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:emg3525-t50b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:emg5523-t50b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:emg5723-t50k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex3301-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5401-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5501-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5512-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5600-t1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5601-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ex5601-t1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg3927-t50k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg4005-b50a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg4005-b60a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg8623-t50b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg8825-t50k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:ax7501-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pm3100-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pm5100-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pm7300-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pm7320-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pm7320-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pmg5317-t20b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pmg5617-t20b2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pmg5617-t20b2:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pmg5617ga_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pmg5622ga_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wx3100-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wx3401-b0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wx5600-t0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-7w44-3x7p-5w78
ASP.NET in Microsoft .NET 3.5 does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks against the form control via the __VIEWSTATE parameter.
[]
null
null
null
null
GHSA-28w4-h56g-grg7
Cross-site Scripting in Jenkins Job Configuration History Plugin
Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names.
[]
null
5.4
null
null
CVE-2021-35297
Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code.
[ "cpe:2.3:a:scalabium:dbase_viewer:2.6:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2020-5872
On BIG-IP 14.1.0-14.1.2.3, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.4.1, when processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-qp4g-hr6q-8w69
Unspecified vulnerability in the Oracle iPlanet Web Server component in Oracle Sun Products Suite Java System Web Server 6.1 and Oracle iPlanet Web Server 7.0 allows remote attackers to affect availability via unknown vectors related to Web Server.
[]
null
null
null
null
GHSA-8fc7-wjj7-mg5j
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
[]
null
null
null
null
CVE-2022-22209
Junos OS: RIB and PFEs can get out of sync due to a memory leak caused by interface flaps or route churn
A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause a Denial of Service (DoS). On all Junos platforms, the Kernel Routing Table (KRT) queue can get stuck due to a memory leak triggered by interface flaps or route churn leading to RIB and PFEs getting out of sync. The memory leak causes RTNEXTHOP/route and next-hop memory pressure issue and the KRT queue will eventually get stuck with the error- 'ENOMEM -- Cannot allocate memory'. The out-of-sync state between RIB and FIB can be seen with the "show route" and "show route forwarding-table" command. This issue will lead to failures for adding new routes. The KRT queue status can be checked using the CLI command "show krt queue": user@host > show krt state High-priority add queue: 1 queued ADD nhtype Router index 0 (31212) error 'ENOMEM -- Cannot allocate memory' kqp '0x8ad5e40' The following messages will be observed in /var/log/messages, which indicate high memory for routes/nexthops: host rpd[16279]: RPD_RT_HWM_NOTICE: New RIB highwatermark for routes: 266 [2022-03-04 05:06:07] host rpd[16279]: RPD_KRT_Q_RETRIES: nexthop ADD: Cannot allocate memory host rpd[16279]: RPD_KRT_Q_RETRIES: nexthop ADD: Cannot allocate memory host kernel: rts_veto_net_delayed_unref_limit: Route/nexthop memory is severe pressure. User Application to perform recovery actions. O p 8 err 12, rtsm_id 0:-1, msg type 10, veto simulation: 0. host kernel: rts_veto_net_delayed_unref_limit: Memory usage of M_RTNEXTHOP type = (806321208) Max size possible for M_RTNEXTHOP type = (689432176) Current delayed unref = (0), Max delayed unref on this platform = (120000) Current delayed weight unref = (0) Max delayed weight unref on this platform = (400000) curproc = rpd. This issue affects: Juniper Networks Junos OS 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2-S1, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; This issue does not affect Juniper Networks Junos OS versions prior to 21.2R1.
[ "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2024:5813
Red Hat Security Advisory: bind and bind-dyndb-ldap security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
CVE-2013-5413
IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation.
[ "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2018-20927
cPanel before 70.0.23 allows jailshell escape because of incorrect crontab parsing (SEC-382).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
3.8
2.1
CVE-2024-46852
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix off-by-one in CMA heap fault handler Until VM_DONTEXPAND was added in commit 1c1914d6e8c6 ("dma-buf: heaps: Don't track CMA dma-buf pages under RssFile") it was possible to obtain a mapping larger than the buffer size via mremap and bypass the overflow check in dma_buf_mmap_internal. When using such a mapping to attempt to fault past the end of the buffer, the CMA heap fault handler also checks the fault offset against the buffer size, but gets the boundary wrong by 1. Fix the boundary check so that we don't read off the end of the pages array and insert an arbitrary page in the mapping.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-h4jp-3vqw-q553
IBM WebSphere MQ 7.1 and 7.5: Queue manager has a DoS vulnerability
[]
null
null
null
null
CVE-2011-5219
Directory traversal vulnerability in examples/show_code.php in mPDF 5.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
[ "cpe:2.3:a:mpdf1:mpdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:mpdf1:mpdf:5.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-955c-643p-2354
Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
6.6
null
CVE-2020-10997
Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table.
[ "cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-pcwj-m6p3-w8x3
Vision Helpdesk through 5.7.0 allows Time-Based Blind SQL injection via the Forgot Password (aka index.php?/home/forgot-password) vis_username parameter. Authentication is not needed.
[]
null
6.5
null
null
CVE-2021-29376
ircII before 20210314 allows remote attackers to cause a denial of service (segmentation fault and client crash, disconnecting the victim from an IRC server) via a crafted CTCP UTC message.
[ "cpe:2.3:a:eterna:ircii:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-j4ww-g56h-h8c7
A cross-site scripting (XSS) vulnerability in /php-opos/login.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter.
[]
null
6.1
null
null
GHSA-fh4p-65g7-4cxw
Cross-site request forgery (CSRF) vulnerability in gpEasy CMS 1.6.2, 1.6.1, and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative users via an Admin_Users action to index.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-m96h-r383-fc62
Multiple cross-site request forgery (CSRF) vulnerabilities on the Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware allow remote attackers to (1) make the admin web server available on the Internet (WAN) interface via the WWWAccessInterface parameter to Forms/RemMagWWW_1 or (2) change the IP whitelisting timeout via the StdioTimout parameter to Forms/rpSysAdmin_1.
[]
null
null
null
null
CVE-2015-8783
tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-4pj8-4cfr-p3m5
Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.
[]
null
null
null
null
GHSA-vr2c-pq5m-cpf7
LimeSurvey before 4.0.0-RC4 allows SQL injection via the participant model.
[]
null
null
null
null
GHSA-wjxv-ccw6-j9xh
The shopp_upload_file AJAX action of the Shopp WordPress plugin through 1.4, available to both unauthenticated and authenticated user does not have any security measure in place to prevent upload of malicious files, such as PHP, allowing unauthenticated users to upload arbitrary files and leading to RCE
[]
null
null
null
null
GHSA-c2h7-93ph-ffjv
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
[]
null
3.9
null
null
CVE-2024-36541
Insecure permissions in logging-operator v4.6.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token.
[ "cpe:2.3:a:kube-logging:logging_operator:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:kube-logging:logging-operator:4.6.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2025-25802
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_ip.php.
[]
null
5.1
null
null
CVE-2015-8438
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted XML object that is mishandled during a toString call, a different vulnerability than CVE-2015-8446.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-vq22-w99f-wr8j
MSA/SMTP.cpp in Trojita before 0.8 ignores certificate-verification errors, which allows man-in-the-middle attackers to spoof SMTP servers.
[]
null
null
null
null
GHSA-5824-f6f2-29r8
Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.11 and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors. NOTE: this is probably different from CVE-2007-0916, but this is not certain due to lack of vendor details.
[]
null
null
null
null
CVE-2025-27410
PwnDoc Arbitrary File Write to RCE using Path Traversal in backup restore as admin
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
[]
null
6.5
null
null
CVE-2019-10055
An issue was discovered in Suricata 4.1.3. The function ftp_pasv_response lacks a check for the length of part1 and part2, leading to a crash within the ftp/mod.rs file.
[ "cpe:2.3:a:suricata-ids:suricata:4.1.4:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
cisco-sa-amp-redirect-rQ2Bu7dU
Cisco Orbital Open Redirect Vulnerability
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU"]
[]
null
4.7
null
null
GHSA-8p58-rq38-6972
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
[]
null
3.1
null
null
GHSA-frw6-628x-33cp
In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists when processing a QMI message.
[]
null
null
9.8
null
GHSA-w5mc-rjm5-5w3q
Buffer overflow in the web-based management interface on the Cisco Linksys WRT54GC router with firmware before 1.06.1 allows remote attackers to cause a denial of service (device crash) via a long string in a POST request.
[]
null
null
null
null
GHSA-3q82-m6mw-7r6x
In netdiag, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05475124.
[]
null
4.4
null
null
CVE-2024-10368
Codezips Sales Management System addstock.php sql injection
A vulnerability was found in Codezips Sales Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /addstock.php. The manipulation of the argument prodtype leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:codezips:sales_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
CVE-2020-9479
unzip directory traversal
When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d. Note: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB
[ "cpe:2.3:a:apache:asterixdb:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2023-37629
Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php."
[ "cpe:2.3:a:simple_online_piggery_management_system_project:simple_online_piggery_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2021-22397
There is a privilege escalation vulnerability in Huawei ManageOne 8.0.0. External parameters of some files are lack of verification when they are be called. Attackers can exploit this vulnerability by performing these files to cause privilege escalation attack. This can compromise normal service.
[ "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-j3f7-j487-wx5j
An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to execute commands via a network.We have already fixed the vulnerability in the following version: Video Station 5.8.2 and later
[]
null
7.4
null
null
CVE-2020-0596
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
[ "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2017-15804
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2021-26231
SQL injection vulnerability in SourceCodester Fantastic Blog CMS v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to category.php.
[ "cpe:2.3:a:fantastic_blog_cms_project:fantastic_blog_cms:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
RHSA-2020:1504
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in speech recognizer
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
9.6
null
GHSA-c63m-82w2-w8f6
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability.
[]
null
5.5
null
null
CVE-2021-39533
An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a heap-based buffer overflow.
[ "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2022-34777
Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[ "cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
GHSA-q43c-5hp4-jq46
Cross-Site Request Forgery (CSRF) vulnerability in Prem Tiwari Disable WordPress Update Notifications and auto-update Email Notifications plugin <= 2.3.3 versions.
[]
null
4.3
null
null
GHSA-r7q2-5gqg-6c7q
actionpack Improper Input Validation vulnerability
The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
[]
null
null
null
null
RHSA-2023:2987
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: GnuTLS gnutls_rnd() can fail and give predictable random values
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.1
null
null
GHSA-cfh3-3xc6-pccj
Cross-Site Request Forgery (CSRF) vulnerability in Gora Tech LLC Cooked Pro allows Cross Site Request Forgery.This issue affects Cooked Pro: from n/a before 1.8.0.
[]
null
4.3
null
null
CVE-2019-5978
Open redirect vulnerability in Cybozu Garoon 4.0.0 to 4.10.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the application 'Scheduler'.
[ "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
GHSA-cvx2-r7fg-g587
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) with software 6.x and 7.x before 7.1(5b)su5, 8.0 before 8.0(3a)su3, and 8.5 and 8.6 before 8.6(2a)su1 and Cisco Business Edition 3000 with software before 8.6.3 and 5000 and 6000 with software before 8.6(2a)su1 allows remote attackers to execute arbitrary SQL commands via a crafted SCCP registration, aka Bug ID CSCtu73538.
[]
null
null
null
null
CVE-2024-56588
scsi: hisi_sas: Create all dump files during debugfs initialization
In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Create all dump files during debugfs initialization For the current debugfs of hisi_sas, after user triggers dump, the driver allocate memory space to save the register information and create debugfs files to display the saved information. In this process, the debugfs files created after each dump. Therefore, when the dump is triggered while the driver is unbind, the following hang occurs: [67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0 [67840.862947] Mem abort info: [67840.865855] ESR = 0x0000000096000004 [67840.869713] EC = 0x25: DABT (current EL), IL = 32 bits [67840.875125] SET = 0, FnV = 0 [67840.878291] EA = 0, S1PTW = 0 [67840.881545] FSC = 0x04: level 0 translation fault [67840.886528] Data abort info: [67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000 [67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000 [67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [67841.003628] pc : down_write+0x30/0x98 [67841.007546] lr : start_creating.part.0+0x60/0x198 [67841.012495] sp : ffff8000b979ba20 [67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40 [67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8 [67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18 [67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020 [67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff [67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18 [67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18 [67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9 [67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001 [67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0 [67841.089759] Call trace: [67841.092456] down_write+0x30/0x98 [67841.096017] start_creating.part.0+0x60/0x198 [67841.100613] debugfs_create_dir+0x48/0x1f8 [67841.104950] debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw] [67841.111447] debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw] [67841.118111] debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw] [67841.125115] full_proxy_write+0x68/0xc8 [67841.129175] vfs_write+0xd8/0x3f0 [67841.132708] ksys_write+0x70/0x108 [67841.136317] __arm64_sys_write+0x24/0x38 [67841.140440] invoke_syscall+0x50/0x128 [67841.144385] el0_svc_common.constprop.0+0xc8/0xf0 [67841.149273] do_el0_svc+0x24/0x38 [67841.152773] el0_svc+0x38/0xd8 [67841.156009] el0t_64_sync_handler+0xc0/0xc8 [67841.160361] el0t_64_sync+0x1a4/0x1a8 [67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05) [67841.170443] ---[ end trace 0000000000000000 ]--- To fix this issue, create all directories and files during debugfs initialization. In this way, the driver only needs to allocate memory space to save information each time the user triggers dumping.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-48683
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
CVE-2012-6624
Cross-site scripting (XSS) vulnerability in the SoundCloud Is Gold plugin 2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the width parameter in a soundcloud_is_gold_player_preview action to wp-admin/admin-ajax.php.
[ "cpe:2.3:a:mightymess:soundcloud_is_gold:2.1:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
CVE-2017-8070
drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
[ "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2024-12822
Media Manager for UserPro <= 3.12.0 - Missing Authorization to Unauthenticated Arbitrary Options Update
The Media Manager for UserPro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the add_capto_img() function in all versions up to, and including, 3.11.0. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
[]
null
9.8
null
null
CVE-2015-1297
The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-h6m9-gq43-hhq2
In the Linux kernel, the following vulnerability has been resolved:RDMA/rtrs-clt: destroy sysfs after removing session from active listA session can be removed dynamically by sysfs interface "remove_path" that eventually calls rtrs_clt_remove_path_from_sysfs function. The current rtrs_clt_remove_path_from_sysfs first removes the sysfs interfaces and frees sess->stats object. Second it removes the session from the active list.Therefore some functions could access non-connected session and access the freed sess->stats object even-if they check the session status before accessing the session.For instance rtrs_clt_request and get_next_path_min_inflight check the session status and try to send IO to the session. The session status could be changed when they are trying to send IO but they could not catch the change and update the statistics information in sess->stats object, and generate use-after-free problem. (see: "RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats")This patch changes the rtrs_clt_remove_path_from_sysfs to remove the session from the active session list and then destroy the sysfs interfaces.Each function still should check the session status because closing or error recovery paths can change the status.
[]
null
7.8
null
null
CVE-2017-3111
An issue was discovered in Adobe Experience Manager 6.3, 6.2, 6.1, 6.0. Sensitive tokens are included in http GET requests under certain circumstances.
[ "cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.2.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2021-34704
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
CVE-2015-7797
Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7798, CVE-2016-1149, and CVE-2016-1150.
[ "cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-mp7x-6p2g-hmwv
A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request.
[]
null
8.8
null
null
CVE-2019-0148
Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.
[ "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2023-26303
markdown-it-py crash on null assertions
Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
[ "cpe:2.3:a:executablebooks:markdown-it-py:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2018-11629
Default and unremovable support credentials (user:lutron password:integration) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the HomeWorks QS Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine
[ "cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lutron:stanza:-:*:*:*:*:*:*:*", "cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lutron:radiora_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lutron:homeworks_qs:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2024-37172
[CVE-2024-37172] Missing Authorization check in SAP S/4HANA Finance (Advanced Payment Management)
SAP S/4HANA Finance (Advanced Payment Management) does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. As a result, it has a low impact to confidentiality and availability but there is no impact on the integrity.
[ "cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4core:108:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2014-0957
Cross-site scripting (XSS) vulnerability in IBM Business Process Manager 7.5 through 8.5.5, and WebSphere Lombardi Edition 7.2, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that triggers a service failure.
[ "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2:*:lombardi:*:*:*:*:*" ]
null
null
null
4.3
GHSA-q6jg-67q9-f4hj
Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
[]
null
null
null
null
CVE-2024-21028
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-m6xf-rg25-42wc
Buildroot before 0b2967e lacks the sticky bit for the /dev/shm directory.
[]
null
7.5
null
null
GHSA-c7qr-mgc8-q54r
A Improper Input Validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000 could allow an attacker to cause a crash of the service through a crafted payload triggering a missing input size check in the pull_file_v2_proc function implemented in the libv2_sdk.so library used by the dji_vtwo_sdk binary implementing the service, compromising it in a term of availability and producing a denial-of-service attack. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.
[]
null
3
null
null
GHSA-mwvc-v6v5-5p39
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
ICSA-21-315-03
Siemens SIMATIC WinCC (Update E)
Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. CVE-2021-40358 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files. CVE-2021-40359 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks on the system. CVE-2021-40364 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
5.5
null
null
GHSA-whx4-pff6-8f75
Cross-site scripting (XSS) vulnerability in myBloggie 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the comments.
[]
null
null
null
null
GHSA-559q-jfjp-2w9j
The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
[]
null
null
null
null
CVE-2015-4839
Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to DB Listener, a different vulnerability than CVE-2015-4798.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-r42x-m65m-82x8
GitLab EE/CE 9.0 to 12.9 allows a maintainer to modify other maintainers' pipeline trigger descriptions within the same project.
[]
null
null
null
null
CVE-2006-0700
imageVue 16.1 allows remote attackers to obtain folder permission settings via a direct request to dir.php, which returns an XML document that lists folders and their permissions.
[ "cpe:2.3:a:imagevue:imagevue:0.16.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-gxgj-6564-3p8j
A permissive list of allowed inputs vulnerability [CWE-183] in FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode may allow an authenticated SSL-VPN user to bypass the policy via bookmarks in the web portal.
[]
null
4.3
null
null
CVE-2019-11021
admin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution. NOTE: "While inadvertently allowing a PHP file to be uploaded via Media Manager was an oversight, it still requires an admin permission. We think it's pretty rare for an administrator to exploit a bug on his/her own site to own his/her own site.
[ "cpe:2.3:a:schlix:cms:2.1.8-7:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
RHSA-2023:0931
Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:logging:5.4::el8" ]
null
5.3
null
null
GHSA-4434-6fgr-q9c4
Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service.
[]
null
7.5
null
null
CVE-2012-1482
Unspecified vulnerability in the TouchPal Contacts (com.cootek.smartdialer) application 3.3.1 and 4.0.1 for Android has unknown impact and attack vectors.
[ "cpe:2.3:a:touchpal:touchpal_contacts:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:touchpal:touchpal_contacts:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2004-1482
The sbuf_getmsg function in BNC incorrectly handles backspace characters, which could allow remote attackers to bypass authentication and gain access to arbitrary scripts.
[ "cpe:2.3:a:bnc:bnc:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:bnc:bnc:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:bnc:bnc:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:bnc:bnc:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:bnc:bnc:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:bnc:bnc:2.8.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-j39j-cvpv-82wg
Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials.
[]
null
8.8
null
null
CVE-2019-11978
A SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*" ]
null
null
8.8
9
CVE-2004-2007
Cross-site scripting (XSS) vulnerability in modules.php in NukeJokes 1.7 and 2 Beta allows remote attackers to inject arbitrary HTML or web script via the (1) cat parameter in a CatView function or (2) jokeid parameter in a JokeView function.
[ "cpe:2.3:a:adam_webb:nukejokes:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adam_webb:nukejokes:2.0_beta:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-37000
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
[ "cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-j8f3-4cqg-mhw4
OPCUAServerToolkit will write a log message once an OPC UA client has successfully connected containing the client's self-defined description field.
[]
null
5.3
null
null
CVE-2024-41130
llama.cpp null pointer dereference in gguf_init_from_file
llama.cpp provides LLM inference in C/C++. Prior to b3427, llama.cpp contains a null pointer dereference in gguf_init_from_file. This vulnerability is fixed in b3427.
[ "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-4fq8-68gc-cjqm
Vesta Control Panel (VestaCP) 0.9.7 through 0.9.8-23 is vulnerable to an authenticated command execution that can result in remote root access on the server. The platform works with PHP as the frontend language and uses shell scripts to execute system actions. PHP executes shell script through the dangerous command exec. This function can be dangerous if arguments passed to it are not filtered. Every user input in VestaCP that is used as an argument is filtered with the escapeshellarg function. This function comes from the PHP library directly and its description is as follows: &quot;escapeshellarg() adds single quotes around a string and quotes/escapes any existing single quotes allowing you to pass a string directly to a shell function and having it be treated as a single safe argument.&quot; It means that if you give Username, it will have &#39;Username&#39; as a replacement. This works well and protects users from exploiting this potentially dangerous exec function. Unfortunately, VestaCP uses this escapeshellarg function incorrectly in several places.
[]
null
null
null
null
GHSA-r486-9x35-xf6g
JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
[]
null
null
6.5
null
GHSA-q6pr-2fq6-v4rv
The Transition Technologies "The Scheduler" app 5.1.3 for Jira allows XXE due to a weakly configured/parameterized XML parser. It was fixed in the versions 5.2.1 and 3.3.7
[]
null
null
7.5
null
CVE-2019-2950
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" ]
null
4.9
null
4