id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-v979-hwcx-2v6g | Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry. | [] | null | null | null | null |
|
CVE-2022-43392 | A buffer overflow vulnerability in the parameter of web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted authorization request.
| [
"cpe:2.3:o:zyxel:lte3301-plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte5388-m804_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte5398-m904_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7240-m403_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7461-m602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7461-m602:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7480-s905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7480-s905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7485-s905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7485-s905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7490-m904_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_lte7461-m602_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_lte7461-m602:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_nr5101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_nr5101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr5101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr5101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx3301-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx4510-b1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx4510-b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx5401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg3525-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg5523-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg5723-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex3301-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5501-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5512-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5600-t1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5601-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5601-t1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg3927-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg4005-b50a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg4005-b60a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8623-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8825-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ax7501-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm3100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm5100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm7300-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm7320-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm7320-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5317-t20b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5617-t20b2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5617-t20b2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5617ga_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5622ga_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx3100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx3401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx5600-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-7w44-3x7p-5w78 | ASP.NET in Microsoft .NET 3.5 does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks against the form control via the __VIEWSTATE parameter. | [] | null | null | null | null |
|
GHSA-28w4-h56g-grg7 | Cross-site Scripting in Jenkins Job Configuration History Plugin | Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names. | [] | null | 5.4 | null | null |
CVE-2021-35297 | Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code. | [
"cpe:2.3:a:scalabium:dbase_viewer:2.6:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2020-5872 | On BIG-IP 14.1.0-14.1.2.3, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.4.1, when processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-qp4g-hr6q-8w69 | Unspecified vulnerability in the Oracle iPlanet Web Server component in Oracle Sun Products Suite Java System Web Server 6.1 and Oracle iPlanet Web Server 7.0 allows remote attackers to affect availability via unknown vectors related to Web Server. | [] | null | null | null | null |
|
GHSA-8fc7-wjj7-mg5j | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans. | [] | null | null | null | null |
|
CVE-2022-22209 | Junos OS: RIB and PFEs can get out of sync due to a memory leak caused by interface flaps or route churn | A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause a Denial of Service (DoS). On all Junos platforms, the Kernel Routing Table (KRT) queue can get stuck due to a memory leak triggered by interface flaps or route churn leading to RIB and PFEs getting out of sync. The memory leak causes RTNEXTHOP/route and next-hop memory pressure issue and the KRT queue will eventually get stuck with the error- 'ENOMEM -- Cannot allocate memory'. The out-of-sync state between RIB and FIB can be seen with the "show route" and "show route forwarding-table" command. This issue will lead to failures for adding new routes. The KRT queue status can be checked using the CLI command "show krt queue": user@host > show krt state High-priority add queue: 1 queued ADD nhtype Router index 0 (31212) error 'ENOMEM -- Cannot allocate memory' kqp '0x8ad5e40' The following messages will be observed in /var/log/messages, which indicate high memory for routes/nexthops: host rpd[16279]: RPD_RT_HWM_NOTICE: New RIB highwatermark for routes: 266 [2022-03-04 05:06:07] host rpd[16279]: RPD_KRT_Q_RETRIES: nexthop ADD: Cannot allocate memory host rpd[16279]: RPD_KRT_Q_RETRIES: nexthop ADD: Cannot allocate memory host kernel: rts_veto_net_delayed_unref_limit: Route/nexthop memory is severe pressure. User Application to perform recovery actions. O p 8 err 12, rtsm_id 0:-1, msg type 10, veto simulation: 0. host kernel: rts_veto_net_delayed_unref_limit: Memory usage of M_RTNEXTHOP type = (806321208) Max size possible for M_RTNEXTHOP type = (689432176) Current delayed unref = (0), Max delayed unref on this platform = (120000) Current delayed weight unref = (0) Max delayed weight unref on this platform = (400000) curproc = rpd. This issue affects: Juniper Networks Junos OS 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2-S1, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; This issue does not affect Juniper Networks Junos OS versions prior to 21.2R1. | [
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHSA-2024:5813 | Red Hat Security Advisory: bind and bind-dyndb-ldap security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
CVE-2013-5413 | IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-20927 | cPanel before 70.0.23 allows jailshell escape because of incorrect crontab parsing (SEC-382). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 3.8 | 2.1 |
|
CVE-2024-46852 | dma-buf: heaps: Fix off-by-one in CMA heap fault handler | In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
Until VM_DONTEXPAND was added in commit 1c1914d6e8c6 ("dma-buf: heaps:
Don't track CMA dma-buf pages under RssFile") it was possible to obtain
a mapping larger than the buffer size via mremap and bypass the overflow
check in dma_buf_mmap_internal. When using such a mapping to attempt to
fault past the end of the buffer, the CMA heap fault handler also checks
the fault offset against the buffer size, but gets the boundary wrong by
1. Fix the boundary check so that we don't read off the end of the pages
array and insert an arbitrary page in the mapping. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-h4jp-3vqw-q553 | IBM WebSphere MQ 7.1 and 7.5: Queue manager has a DoS vulnerability | [] | null | null | null | null |
|
CVE-2011-5219 | Directory traversal vulnerability in examples/show_code.php in mPDF 5.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:a:mpdf1:mpdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mpdf1:mpdf:5.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-955c-643p-2354 | Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | [] | null | null | 6.6 | null |
|
CVE-2020-10997 | Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. | [
"cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-pcwj-m6p3-w8x3 | Vision Helpdesk through 5.7.0 allows Time-Based Blind SQL injection via the Forgot Password (aka index.php?/home/forgot-password) vis_username parameter. Authentication is not needed. | [] | null | 6.5 | null | null |
|
CVE-2021-29376 | ircII before 20210314 allows remote attackers to cause a denial of service (segmentation fault and client crash, disconnecting the victim from an IRC server) via a crafted CTCP UTC message. | [
"cpe:2.3:a:eterna:ircii:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-j4ww-g56h-h8c7 | A cross-site scripting (XSS) vulnerability in /php-opos/login.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter. | [] | null | 6.1 | null | null |
|
GHSA-fh4p-65g7-4cxw | Cross-site request forgery (CSRF) vulnerability in gpEasy CMS 1.6.2, 1.6.1, and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative users via an Admin_Users action to index.php. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-m96h-r383-fc62 | Multiple cross-site request forgery (CSRF) vulnerabilities on the Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware allow remote attackers to (1) make the admin web server available on the Internet (WAN) interface via the WWWAccessInterface parameter to Forms/RemMagWWW_1 or (2) change the IP whitelisting timeout via the StdioTimout parameter to Forms/rpSysAdmin_1. | [] | null | null | null | null |
|
CVE-2015-8783 | tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-4pj8-4cfr-p3m5 | Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions. | [] | null | null | null | null |
|
GHSA-vr2c-pq5m-cpf7 | LimeSurvey before 4.0.0-RC4 allows SQL injection via the participant model. | [] | null | null | null | null |
|
GHSA-wjxv-ccw6-j9xh | The shopp_upload_file AJAX action of the Shopp WordPress plugin through 1.4, available to both unauthenticated and authenticated user does not have any security measure in place to prevent upload of malicious files, such as PHP, allowing unauthenticated users to upload arbitrary files and leading to RCE | [] | null | null | null | null |
|
GHSA-c2h7-93ph-ffjv | Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access. | [] | null | 3.9 | null | null |
|
CVE-2024-36541 | Insecure permissions in logging-operator v4.6.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token. | [
"cpe:2.3:a:kube-logging:logging_operator:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kube-logging:logging-operator:4.6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2025-25802 | SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_ip.php. | [] | null | 5.1 | null | null |
|
CVE-2015-8438 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted XML object that is mishandled during a toString call, a different vulnerability than CVE-2015-8446. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-vq22-w99f-wr8j | MSA/SMTP.cpp in Trojita before 0.8 ignores certificate-verification errors, which allows man-in-the-middle attackers to spoof SMTP servers. | [] | null | null | null | null |
|
GHSA-5824-f6f2-29r8 | Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.11 and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors. NOTE: this is probably different from CVE-2007-0916, but this is not certain due to lack of vendor details. | [] | null | null | null | null |
|
CVE-2025-27410 | PwnDoc Arbitrary File Write to RCE using Path Traversal in backup restore as admin | PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue. | [] | null | 6.5 | null | null |
CVE-2019-10055 | An issue was discovered in Suricata 4.1.3. The function ftp_pasv_response lacks a check for the length of part1 and part2, leading to a crash within the ftp/mod.rs file. | [
"cpe:2.3:a:suricata-ids:suricata:4.1.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
cisco-sa-amp-redirect-rQ2Bu7dU | Cisco Orbital Open Redirect Vulnerability | A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage.
This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU"] | [] | null | 4.7 | null | null |
GHSA-8p58-rq38-6972 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). | [] | null | 3.1 | null | null |
|
GHSA-frw6-628x-33cp | In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists when processing a QMI message. | [] | null | null | 9.8 | null |
|
GHSA-w5mc-rjm5-5w3q | Buffer overflow in the web-based management interface on the Cisco Linksys WRT54GC router with firmware before 1.06.1 allows remote attackers to cause a denial of service (device crash) via a long string in a POST request. | [] | null | null | null | null |
|
GHSA-3q82-m6mw-7r6x | In netdiag, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05475124. | [] | null | 4.4 | null | null |
|
CVE-2024-10368 | Codezips Sales Management System addstock.php sql injection | A vulnerability was found in Codezips Sales Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /addstock.php. The manipulation of the argument prodtype leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:codezips:sales_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2020-9479 | unzip directory traversal | When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d. Note: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB | [
"cpe:2.3:a:apache:asterixdb:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
CVE-2023-37629 | Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php." | [
"cpe:2.3:a:simple_online_piggery_management_system_project:simple_online_piggery_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2021-22397 | There is a privilege escalation vulnerability in Huawei ManageOne 8.0.0. External parameters of some files are lack of verification when they are be called. Attackers can exploit this vulnerability by performing these files to cause privilege escalation attack. This can compromise normal service. | [
"cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-j3f7-j487-wx5j | An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to execute commands via a network.We have already fixed the vulnerability in the following version:
Video Station 5.8.2 and later | [] | null | 7.4 | null | null |
|
CVE-2020-0596 | Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access. | [
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2017-15804 | The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2021-26231 | SQL injection vulnerability in SourceCodester Fantastic Blog CMS v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to category.php. | [
"cpe:2.3:a:fantastic_blog_cms_project:fantastic_blog_cms:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2020:1504 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in speech recognizer | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 9.6 | null |
GHSA-c63m-82w2-w8f6 | Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability. | [] | null | 5.5 | null | null |
|
CVE-2021-39533 | An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a heap-based buffer overflow. | [
"cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2022-34777 | Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-q43c-5hp4-jq46 | Cross-Site Request Forgery (CSRF) vulnerability in Prem Tiwari Disable WordPress Update Notifications and auto-update Email Notifications plugin <= 2.3.3 versions. | [] | null | 4.3 | null | null |
|
GHSA-r7q2-5gqg-6c7q | actionpack Improper Input Validation vulnerability | The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | [] | null | null | null | null |
RHSA-2023:2987 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: GnuTLS gnutls_rnd() can fail and give predictable random values | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.1 | null | null |
GHSA-cfh3-3xc6-pccj | Cross-Site Request Forgery (CSRF) vulnerability in Gora Tech LLC Cooked Pro allows Cross Site Request Forgery.This issue affects Cooked Pro: from n/a before 1.8.0. | [] | null | 4.3 | null | null |
|
CVE-2019-5978 | Open redirect vulnerability in Cybozu Garoon 4.0.0 to 4.10.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the application 'Scheduler'. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
GHSA-cvx2-r7fg-g587 | SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) with software 6.x and 7.x before 7.1(5b)su5, 8.0 before 8.0(3a)su3, and 8.5 and 8.6 before 8.6(2a)su1 and Cisco Business Edition 3000 with software before 8.6.3 and 5000 and 6000 with software before 8.6(2a)su1 allows remote attackers to execute arbitrary SQL commands via a crafted SCCP registration, aka Bug ID CSCtu73538. | [] | null | null | null | null |
|
CVE-2024-56588 | scsi: hisi_sas: Create all dump files during debugfs initialization | In the Linux kernel, the following vulnerability has been resolved:
scsi: hisi_sas: Create all dump files during debugfs initialization
For the current debugfs of hisi_sas, after user triggers dump, the
driver allocate memory space to save the register information and create
debugfs files to display the saved information. In this process, the
debugfs files created after each dump.
Therefore, when the dump is triggered while the driver is unbind, the
following hang occurs:
[67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[67840.862947] Mem abort info:
[67840.865855] ESR = 0x0000000096000004
[67840.869713] EC = 0x25: DABT (current EL), IL = 32 bits
[67840.875125] SET = 0, FnV = 0
[67840.878291] EA = 0, S1PTW = 0
[67840.881545] FSC = 0x04: level 0 translation fault
[67840.886528] Data abort info:
[67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000
[67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000
[67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[67841.003628] pc : down_write+0x30/0x98
[67841.007546] lr : start_creating.part.0+0x60/0x198
[67841.012495] sp : ffff8000b979ba20
[67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40
[67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8
[67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18
[67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020
[67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff
[67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18
[67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18
[67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9
[67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001
[67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0
[67841.089759] Call trace:
[67841.092456] down_write+0x30/0x98
[67841.096017] start_creating.part.0+0x60/0x198
[67841.100613] debugfs_create_dir+0x48/0x1f8
[67841.104950] debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw]
[67841.111447] debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw]
[67841.118111] debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw]
[67841.125115] full_proxy_write+0x68/0xc8
[67841.129175] vfs_write+0xd8/0x3f0
[67841.132708] ksys_write+0x70/0x108
[67841.136317] __arm64_sys_write+0x24/0x38
[67841.140440] invoke_syscall+0x50/0x128
[67841.144385] el0_svc_common.constprop.0+0xc8/0xf0
[67841.149273] do_el0_svc+0x24/0x38
[67841.152773] el0_svc+0x38/0xd8
[67841.156009] el0t_64_sync_handler+0xc0/0xc8
[67841.160361] el0t_64_sync+0x1a4/0x1a8
[67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05)
[67841.170443] ---[ end trace 0000000000000000 ]---
To fix this issue, create all directories and files during debugfs
initialization. In this way, the driver only needs to allocate memory
space to save information each time the user triggers dumping. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-48683 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
|
CVE-2012-6624 | Cross-site scripting (XSS) vulnerability in the SoundCloud Is Gold plugin 2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the width parameter in a soundcloud_is_gold_player_preview action to wp-admin/admin-ajax.php. | [
"cpe:2.3:a:mightymess:soundcloud_is_gold:2.1:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-8070 | drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | [
"cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2024-12822 | Media Manager for UserPro <= 3.12.0 - Missing Authorization to Unauthenticated Arbitrary Options Update | The Media Manager for UserPro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the add_capto_img() function in all versions up to, and including, 3.11.0. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [] | null | 9.8 | null | null |
CVE-2015-1297 | The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-h6m9-gq43-hhq2 | In the Linux kernel, the following vulnerability has been resolved:RDMA/rtrs-clt: destroy sysfs after removing session from active listA session can be removed dynamically by sysfs interface "remove_path" that
eventually calls rtrs_clt_remove_path_from_sysfs function. The current
rtrs_clt_remove_path_from_sysfs first removes the sysfs interfaces and
frees sess->stats object. Second it removes the session from the active
list.Therefore some functions could access non-connected session and access the
freed sess->stats object even-if they check the session status before
accessing the session.For instance rtrs_clt_request and get_next_path_min_inflight check the
session status and try to send IO to the session. The session status
could be changed when they are trying to send IO but they could not catch
the change and update the statistics information in sess->stats object,
and generate use-after-free problem.
(see: "RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its
stats")This patch changes the rtrs_clt_remove_path_from_sysfs to remove the
session from the active session list and then destroy the sysfs
interfaces.Each function still should check the session status because closing or
error recovery paths can change the status. | [] | null | 7.8 | null | null |
|
CVE-2017-3111 | An issue was discovered in Adobe Experience Manager 6.3, 6.2, 6.1, 6.0. Sensitive tokens are included in http GET requests under certain circumstances. | [
"cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-34704 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | [
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
CVE-2015-7797 | Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7798, CVE-2016-1149, and CVE-2016-1150. | [
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-mp7x-6p2g-hmwv | A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request. | [] | null | 8.8 | null | null |
|
CVE-2019-0148 | Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access. | [
"cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2023-26303 | markdown-it-py crash on null assertions | Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
| [
"cpe:2.3:a:executablebooks:markdown-it-py:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
CVE-2018-11629 | Default and unremovable support credentials (user:lutron password:integration) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the HomeWorks QS Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine | [
"cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lutron:stanza:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lutron:radiora_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lutron:homeworks_qs:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2024-37172 | [CVE-2024-37172] Missing Authorization check in SAP S/4HANA Finance (Advanced Payment Management) | SAP S/4HANA Finance (Advanced Payment
Management) does not perform necessary authorization check for an authenticated
user, resulting in escalation of privileges. As a result, it has a low impact
to confidentiality and availability but there is no impact on the integrity. | [
"cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:108:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2014-0957 | Cross-site scripting (XSS) vulnerability in IBM Business Process Manager 7.5 through 8.5.5, and WebSphere Lombardi Edition 7.2, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that triggers a service failure. | [
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2:*:lombardi:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-q6jg-67q9-f4hj | Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-21028 | Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-m6xf-rg25-42wc | Buildroot before 0b2967e lacks the sticky bit for the /dev/shm directory. | [] | null | 7.5 | null | null |
|
GHSA-c7qr-mgc8-q54r | A Improper Input Validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000 could allow an attacker to cause a crash of the service through a crafted payload triggering a missing input size check in the pull_file_v2_proc function implemented in the libv2_sdk.so library used by the dji_vtwo_sdk binary implementing the service, compromising it in a term of availability and producing a denial-of-service attack. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620. | [] | null | 3 | null | null |
|
GHSA-mwvc-v6v5-5p39 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | null | null | null |
|
ICSA-21-315-03 | Siemens SIMATIC WinCC (Update E) | Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. CVE-2021-40358 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files. CVE-2021-40359 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks on the system. CVE-2021-40364 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [] | null | 5.5 | null | null |
GHSA-whx4-pff6-8f75 | Cross-site scripting (XSS) vulnerability in myBloggie 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the comments. | [] | null | null | null | null |
|
GHSA-559q-jfjp-2w9j | The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability. | [] | null | null | null | null |
|
CVE-2015-4839 | Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to DB Listener, a different vulnerability than CVE-2015-4798. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-r42x-m65m-82x8 | GitLab EE/CE 9.0 to 12.9 allows a maintainer to modify other maintainers' pipeline trigger descriptions within the same project. | [] | null | null | null | null |
|
CVE-2006-0700 | imageVue 16.1 allows remote attackers to obtain folder permission settings via a direct request to dir.php, which returns an XML document that lists folders and their permissions. | [
"cpe:2.3:a:imagevue:imagevue:0.16.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-gxgj-6564-3p8j | A permissive list of allowed inputs vulnerability [CWE-183] in FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode may allow an authenticated SSL-VPN user to bypass the policy via bookmarks in the web portal. | [] | null | 4.3 | null | null |
|
CVE-2019-11021 | admin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution. NOTE: "While inadvertently allowing a PHP file to be uploaded via Media Manager was an oversight, it still requires an admin permission. We think it's pretty rare for an administrator to exploit a bug on his/her own site to own his/her own site. | [
"cpe:2.3:a:schlix:cms:2.1.8-7:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
RHSA-2023:0931 | Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:logging:5.4::el8"
] | null | 5.3 | null | null |
GHSA-4434-6fgr-q9c4 | Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service. | [] | null | 7.5 | null | null |
|
CVE-2012-1482 | Unspecified vulnerability in the TouchPal Contacts (com.cootek.smartdialer) application 3.3.1 and 4.0.1 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:touchpal:touchpal_contacts:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:touchpal:touchpal_contacts:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2004-1482 | The sbuf_getmsg function in BNC incorrectly handles backspace characters, which could allow remote attackers to bypass authentication and gain access to arbitrary scripts. | [
"cpe:2.3:a:bnc:bnc:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.8.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-j39j-cvpv-82wg | Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials. | [] | null | 8.8 | null | null |
|
CVE-2019-11978 | A SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2004-2007 | Cross-site scripting (XSS) vulnerability in modules.php in NukeJokes 1.7 and 2 Beta allows remote attackers to inject arbitrary HTML or web script via the (1) cat parameter in a CatView function or (2) jokeid parameter in a JokeView function. | [
"cpe:2.3:a:adam_webb:nukejokes:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adam_webb:nukejokes:2.0_beta:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-37000 | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-j8f3-4cqg-mhw4 | OPCUAServerToolkit will write a log message once an OPC UA client has successfully connected containing the client's self-defined description field. | [] | null | 5.3 | null | null |
|
CVE-2024-41130 | llama.cpp null pointer dereference in gguf_init_from_file | llama.cpp provides LLM inference in C/C++. Prior to b3427, llama.cpp contains a null pointer dereference in gguf_init_from_file. This vulnerability is fixed in b3427. | [
"cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-4fq8-68gc-cjqm | Vesta Control Panel (VestaCP) 0.9.7 through 0.9.8-23 is vulnerable to an authenticated command execution that can result in remote root access on the server. The platform works with PHP as the frontend language and uses shell scripts to execute system actions. PHP executes shell script through the dangerous command exec. This function can be dangerous if arguments passed to it are not filtered. Every user input in VestaCP that is used as an argument is filtered with the escapeshellarg function. This function comes from the PHP library directly and its description is as follows: "escapeshellarg() adds single quotes around a string and quotes/escapes any existing single quotes allowing you to pass a string directly to a shell function and having it be treated as a single safe argument." It means that if you give Username, it will have 'Username' as a replacement. This works well and protects users from exploiting this potentially dangerous exec function. Unfortunately, VestaCP uses this escapeshellarg function incorrectly in several places. | [] | null | null | null | null |
|
GHSA-r486-9x35-xf6g | JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. | [] | null | null | 6.5 | null |
|
GHSA-q6pr-2fq6-v4rv | The Transition Technologies "The Scheduler" app 5.1.3 for Jira allows XXE due to a weakly configured/parameterized XML parser. It was fixed in the versions 5.2.1 and 3.3.7 | [] | null | null | 7.5 | null |
|
CVE-2019-2950 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.