id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9q22-p2gh-64cm | The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data. | [] | null | 7.5 | null | null |
|
CVE-2019-16012 | Cisco SD-WAN Solution vManage SQL Injection Vulnerability | A vulnerability in the web UI of Cisco SD-WAN Solution vManage software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web UI improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on, or return values from, the underlying database as well as the operating system. | [
"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
CVE-2017-2641 | In Moodle 2.x and 3.x, SQL injection can occur via user preferences. | [
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-6xwq-33rx-28hg | A remote xss vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78. | [] | null | null | null | null |
|
GHSA-28h9-44vg-f29v | In the Linux kernel, the following vulnerability has been resolved:ionic: fix use after netif_napi_del()When queues are started, netif_napi_add() and napi_enable() are called.
If there are 4 queues and only 3 queues are used for the current
configuration, only 3 queues' napi should be registered and enabled.
The ionic_qcq_enable() checks whether the .poll pointer is not NULL for
enabling only the using queue' napi. Unused queues' napi will not be
registered by netif_napi_add(), so the .poll pointer indicates NULL.
But it couldn't distinguish whether the napi was unregistered or not
because netif_napi_del() doesn't reset the .poll pointer to NULL.
So, ionic_qcq_enable() calls napi_enable() for the queue, which was
unregistered by netif_napi_del().Reproducer:
ethtool -L <interface name> rx 1 tx 1 combined 0
ethtool -L <interface name> rx 0 tx 0 combined 1
ethtool -L <interface name> rx 0 tx 0 combined 4Splat looks like:
kernel BUG at net/core/dev.c:6666!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16
Workqueue: events ionic_lif_deferred_work [ionic]
RIP: 0010:napi_enable+0x3b/0x40
Code: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f
RSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28
RBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20
FS: 0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
<TASK>
? die+0x33/0x90
? do_trap+0xd9/0x100
? napi_enable+0x3b/0x40
? do_error_trap+0x83/0xb0
? napi_enable+0x3b/0x40
? napi_enable+0x3b/0x40
? exc_invalid_op+0x4e/0x70
? napi_enable+0x3b/0x40
? asm_exc_invalid_op+0x16/0x20
? napi_enable+0x3b/0x40
ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
process_one_work+0x145/0x360
worker_thread+0x2bb/0x3d0
? __pfx_worker_thread+0x10/0x10
kthread+0xcc/0x100
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2d/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30 | [] | null | null | null | null |
|
CVE-2025-2927 | ESAFENET CDG getFileTypeList.jsp sql injection | A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been classified as critical. Affected is an unknown function of the file /parameter/getFileTypeList.jsp. The manipulation of the argument typename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-g55j-rqcq-fhgc | Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL. | [] | null | null | null | null |
|
CVE-2024-20278 | A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root. | [
"cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2002-0790 | clchkspuser and clpasswdremote in AIX expose an encrypted password in the cspoc.log file, which could allow local users to gain privileges. | [
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-wpf6-86vf-246w | ION memory management module in Huawei Mate8 phones with software NXT-AL10C00B561 and earlier versions, NXT-CL10C00B561 and earlier versions, NXT-DL10C00B561 and earlier versions, NXT-TL10C00B561 and earlier versions allows attackers to cause a denial of service (restart). | [] | null | null | 5.5 | null |
|
GHSA-pqx5-jj73-9xw4 | SQL injection vulnerability in stylesheet.php in CMS Made Simple 1.0.5 and earlier allows remote attackers to execute arbitrary SQL commands via the templateid parameter. | [] | null | null | null | null |
|
GHSA-76r6-q666-w6fg | A vulnerability classified as problematic was found in DedeBIZ 6.2.10. Affected by this vulnerability is an unknown functionality of the file /admin/vote_edit.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235189 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 2.4 | null |
|
CVE-2019-15656 | D-Link DSL-2875AL and DSL-2877AL devices through 1.00.05 are prone to information disclosure via a simple crafted request to index.asp on the web management server because of username_v and password_v variables. | [
"cpe:2.3:o:dlink:dsl-2875al_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-2875al:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dsl-2877al_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-2877al:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-w7gq-f8g4-7q9f | The affected Fuji Electric V-Server Lite versions prior to 3.3.24.0 are vulnerable to an out-of-bounds write, which may allow an attacker to remotely execute arbitrary code. | [] | null | null | null | null |
|
CVE-2024-35991 | dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue | In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue
drain_workqueue() cannot be called safely in a spinlocked context due to
possible task rescheduling. In the multi-task scenario, calling
queue_work() while drain_workqueue() will lead to a Call Trace as
pushing a work on a draining workqueue is not permitted in spinlocked
context.
Call Trace:
<TASK>
? __warn+0x7d/0x140
? __queue_work+0x2b2/0x440
? report_bug+0x1f8/0x200
? handle_bug+0x3c/0x70
? exc_invalid_op+0x18/0x70
? asm_exc_invalid_op+0x1a/0x20
? __queue_work+0x2b2/0x440
queue_work_on+0x28/0x30
idxd_misc_thread+0x303/0x5a0 [idxd]
? __schedule+0x369/0xb40
? __pfx_irq_thread_fn+0x10/0x10
? irq_thread+0xbc/0x1b0
irq_thread_fn+0x21/0x70
irq_thread+0x102/0x1b0
? preempt_count_add+0x74/0xa0
? __pfx_irq_thread_dtor+0x10/0x10
? __pfx_irq_thread+0x10/0x10
kthread+0x103/0x140
? __pfx_kthread+0x10/0x10
ret_from_fork+0x31/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1b/0x30
</TASK>
The current implementation uses a spinlock to protect event log workqueue
and will lead to the Call Trace due to potential task rescheduling.
To address the locking issue, convert the spinlock to mutex, allowing
the drain_workqueue() to be called in a safe mutex-locked context.
This change ensures proper synchronization when accessing the event log
workqueue, preventing potential Call Trace and improving the overall
robustness of the code. | [] | null | null | null | null |
CVE-2019-14468 | GnuCOBOL 2.2 has a buffer overflow in cb_push_op in cobc/field.c via crafted COBOL source code. | [
"cpe:2.3:a:gnucobol_project:gnucobol:2.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2024-56511 | DataEase has an unauthorized vulnerability | DataEase is an open source data visualization analysis tool. Prior to 2.10.4, there is a flaw in the authentication in the io.dataease.auth.filter.TokenFilter class, which can be bypassed and cause the risk of unauthorized access. In the io.dataease.auth.filter.TokenFilter class, ”request.getRequestURI“ is used to obtain the request URL, and it is passed to the "WhitelistUtils.match" method to determine whether the URL request is an interface that does not require authentication. The "match" method filters semicolons, but this is not enough. When users set "server.servlet.context-path" when deploying products, there is still a risk of being bypassed, which can be bypassed by any whitelist prefix /geo/../context-path/. The vulnerability has been fixed in v2.10.4. | [] | 9.3 | null | null | null |
GHSA-793q-6x5r-cvhx | "HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy." | [] | null | null | null | null |
|
CVE-2019-19091 | ABB eSOMS: HTTP response information leakage | For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information about the application. An attacker might use this detail information to specifically craft the attack. | [
"cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-q869-52p3-m2g6 | Use after free in SwiftShader in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | 8.8 | null | null |
|
GHSA-xw78-vx8x-r728 | Multiple cross-site request forgery (CSRF) vulnerabilities in the ACL Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25c allow remote attackers to hijack the authentication of administrators for requests that modify access control rules, and other unspecified requests, via unknown vectors. | [] | null | null | null | null |
|
GHSA-c3vv-p7mp-g6xv | IOAcceleratorFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-3706. | [] | null | null | null | null |
|
GHSA-955q-2rmr-5vhw | The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string. | [] | null | null | null | null |
|
GHSA-9m4h-7g4v-j826 | CRLF injection vulnerability in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k, when running on older PHP interpreters, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. | [] | null | null | null | null |
|
GHSA-x7vg-mx5p-974m | MicroEngine Mailform version 1.1.0 to 1.1.8 contains a path traversal vulnerability. If the product's file upload function and server save option are enabled, a remote attacker may save an arbitrary file on the server and execute it. | [] | null | 9.8 | null | null |
|
GHSA-395r-v34f-5jmw | A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 8.8 | null | null |
|
CVE-2021-25088 | Google XML Sitemaps < 4.1.3 - Admin+ Stored Cross-Site Scripting | The XML Sitemaps WordPress plugin before 4.1.3 does not sanitise and escape a settings before outputting it in the Debug page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:google_xml_sitemaps_project:google_xml_sitemaps:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2019-13743 | Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-57m7-2g72-pv8m | A improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets. | [] | null | 4.5 | null | null |
|
ICSA-21-145-02 | Rockwell Automation Micro800 and MicroLogix 1400 | When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller causing a denial-of-service condition.CVE-2021-32926 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H). | [] | null | null | 6.1 | null |
CVE-2014-7746 | The Fusion Flowers - Weddings (aka com.triactivemedia.fusionweddings) application @7F0801AA for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:pocketmags:fusion_flowers_-_weddings:\\@7f0801aa:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2024-49850 | bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos | In the Linux kernel, the following vulnerability has been resolved:
bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos
In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL
referencing a non-existing BTF type, function bpf_core_calc_relo_insn
would cause a null pointer deference.
Fix this by adding a proper check upper in call stack, as malformed
relocation records could be passed from user space.
Simplest reproducer is a program:
r0 = 0
exit
With a single relocation record:
.insn_off = 0, /* patch first instruction */
.type_id = 100500, /* this type id does not exist */
.access_str_off = 6, /* offset of string "0" */
.kind = BPF_CORE_TYPE_ID_LOCAL,
See the link for original reproducer or next commit for a test case. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2021-0357 | In netdiag, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442002. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2005-4482 | Cross-site scripting (XSS) vulnerability in login.asp in PortalApp 3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the ret_page parameter. | [
"cpe:2.3:a:iatek:portalapp:3.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-40579 | OpenFGA Authorization Bypass | OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1. | [
"cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
RHSA-2022:2081 | Red Hat Security Advisory: bluez security update | bluez: memory leak in the SDP protocol | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.3 | null | null |
GHSA-3rwg-qhqc-m6rc | Improper neutralization of livestatus command delimiters in mknotifyd in Checkmk <= 2.0.0p39, < 2.1.0p47, < 2.2.0p32 and < 2.3.0p11 allows arbitrary livestatus command execution. | [] | null | 6.5 | null | null |
|
CVE-2024-31301 | WordPress Multiple Page Generator Plugin – MPG plugin <= 3.4.0 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Themeisle Multiple Page Generator Plugin – MPG.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.4.0.
| [] | null | 5.4 | null | null |
CVE-2021-42011 | An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2023-32292 | WordPress Chat Button Plugin <= 1.8.9.4 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GetButton Chat Button by GetButton.Io plugin <= 1.8.9.4 versions. | [
"cpe:2.3:a:getbutton:chat_button:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2018-14622 | A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections. | [
"cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*"
] | null | null | 5.3 | null |
|
CVE-2023-40385 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. A remote attacker may be able to view leaked DNS queries with Private Relay turned on. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2022-46850 | WordPress Easy Media Replace Plugin <= 0.1.3 is vulnerable to Arbitrary File Deletion | Auth. (author+) Broken Access Control vulnerability leading to Arbitrary File Deletion in Nabil Lemsieh Easy Media Replace plugin <= 0.1.3 versions. | [
"cpe:2.3:a:easy_media_replace_project:easy_media_replace:*:*:*:*:*:wordpress:*:*"
] | null | 8.7 | null | null |
CVE-2023-3013 | Unchecked Return Value in gpac/gpac | Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | null | 4.4 | null |
GHSA-33cj-w75f-49m2 | Magento 2 Community Edition Server-Side Request Forgery vulnerability | A server-side request forgery (SSRF) vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to the admin panel to manipulate system configuration and execute arbitrary code. | [] | null | null | 7.2 | null |
CVE-2021-4116 | Cross-site Scripting (XSS) - Stored in yetiforcecompany/yetiforcecrm | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
"cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*"
] | null | null | 6.6 | null |
GHSA-h62x-f726-fw3q | Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity. | [] | null | 8.2 | null | null |
|
ICSA-18-317-08 | Siemens SIMATIC Panels | A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authenitcation is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | 6.5 | null | null |
GHSA-pw98-xw8g-fx7h | admin.php in CCleague Pro 1.2 allows remote attackers to bypass authentication by setting the type cookie value to admin. | [] | null | null | null | null |
|
GHSA-vmg9-m4fj-jrr8 | SQL injection vulnerability in Types.asp in Enthrallweb eCars 1.0 allows remote attackers to execute arbitrary SQL commands via the Type_id parameter. | [] | null | null | null | null |
|
RHBA-2014:1417 | Red Hat Bug Fix Advisory: icedtea-web bug fix and enhancement update | icedtea-web: insecure temporary file use flaw in LiveConnect implementation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2018-7812 | An Information Exposure through Discrepancy vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where the web server sends different responses in a way that exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. | [
"cpe:2.3:o:schneider-electric:modicom_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_premium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_premium:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_quantum:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_bmxnor0200h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_bmxnor0200h:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-cvgx-92m2-rg4r | ** DISPUTED ** Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.6.8 allow remote attackers to inject arbitrary web code or HTML via the (1) s parameter to index.php, and the (2) q parameter to (a) faq.php, (b) member.php, (c) memberlist.php, (d) calendar.php, (e) search.php, (f) forumdisplay.php, (g) showgroups.php, (h) online.php, and (i) sendmessage.php. NOTE: these issues have been disputed by the vendor, stating "I can't reproduce a single one of these". The researcher is known to be unreliable. | [] | null | null | null | null |
|
CVE-2021-46122 | Tp-Link TL-WR840N (EU) v6.20 Firmware (0.9.1 4.17 v0001.0 Build 201124 Rel.64328n) is vulnerable to Buffer Overflow via the Password reset feature. | [
"cpe:2.3:o:tp-link:tl-wr840n_firmware:0.9.1_4.17_v0001.0:build_201124_rel.64328n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr840n:6.20:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
CVE-2008-0118 | Unspecified vulnerability in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, Excel Viewer 2003 up to SP3, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption from an "allocation error," aka "Microsoft Office Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2011-4585 | login/change_password.php in Moodle 1.9.x before 1.9.15 does not use https for the change-password form even if the httpslogin option is enabled, which allows remote attackers to obtain credentials by sniffing the network. | [
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-6jcp-68rq-927h | An Information Disclosure vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.5, 5.2 and below versions allow an admin user with super_admin privileges to view the current SSL VPN web portal session info which may contains user credentials through the fnsysctl CLI command. | [] | null | null | 7.2 | null |
|
CVE-2022-34262 | Adobe Illustrator Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Illustrator versions 26.3.1 (and earlier) and 25.4.6 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-2fxw-qwh5-hh6c | The Contact Form Email plugin before 1.2.66 for WordPress allows wp-admin/admin.php item XSS, related to cp_admin_int_edition.inc.php in the "custom edition area." | [] | null | null | 6.1 | null |
|
CVE-2022-30822 | In Wedding Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "users_profile.php" file. | [
"cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-vhg6-m6c8-39c2 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.19.Users are recommended to upgrade to version 18.12.19, which fixes the issue. | [] | null | 6.1 | null | null |
|
GHSA-g2v8-rp7f-83rh | Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_hide_by_meadia_full value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset. | [] | null | null | null | null |
|
GHSA-q4p6-5cf2-247q | In the Linux kernel, the following vulnerability has been resolved:firmware_loader: Block path traversalMost firmware names are hardcoded strings, or are constructed from fairly
constrained format strings where the dynamic parts are just some hex
numbers or such.However, there are a couple codepaths in the kernel where firmware file
names contain string components that are passed through from a device or
semi-privileged userspace; the ones I could find (not counting interfaces
that require root privileges) are:lpfc_sli4_request_firmware_update() seems to construct the firmware
filename from "ModelName", a string that was previously parsed out of
some descriptor ("Vital Product Data") in lpfc_fill_vpd()nfp_net_fw_find() seems to construct a firmware filename from a model
name coming from nfp_hwinfo_lookup(pf->hwinfo, "nffw.partno"), which I
think parses some descriptor that was read from the device.
(But this case likely isn't exploitable because the format string looks
like "netronome/nic_%s", and there shouldn't be any *folders* starting
with "netronome/nic_". The previous case was different because there,
the "%s" is *at the start* of the format string.)module_flash_fw_schedule() is reachable from the
ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command, which is marked as
GENL_UNS_ADMIN_PERM (meaning CAP_NET_ADMIN inside a user namespace is
enough to pass the privilege check), and takes a userspace-provided
firmware name.
(But I think to reach this case, you need to have CAP_NET_ADMIN over a
network namespace that a special kind of ethernet device is mapped into,
so I think this is not a viable attack path in practice.)Fix it by rejecting any firmware names containing ".." path components.For what it's worth, I went looking and haven't found any USB device
drivers that use the firmware loader dangerously. | [] | null | 7.8 | null | null |
|
CVE-2008-5452 | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.9.18 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:jdedwards:enterpriseone:8.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.9.18:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
GHSA-hmm6-p5gh-p2h9 | Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability | [] | null | 7.3 | null | null |
|
CVE-2023-24868 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2019-1889 | Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability | A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileges to root on an affected device. The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could exploit this vulnerability by uploading malicious software using the REST API. A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device. | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
GHSA-48x9-64j6-vm38 | Submitty before v22.06.00 is vulnerable to Incorrect Access Control. An attacker can delete any post in the forum by modifying request parameter. | [] | null | 5.3 | null | null |
|
GHSA-8pgq-587r-5r5g | Command School Student Management System 1.06.01 does not properly restrict access to sw/backup/backup_ray2.php, which allows remote attackers to download a database backup via a direct request. | [] | null | null | null | null |
|
CVE-2024-8652 | Netcat CMS: reflected cross-site scripting in openstat module | A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific path on the site.
This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.
Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch. | [
"cpe:2.3:a:netcat:netcat_content_management_system:*:*:*:*:-:*:*:*"
] | 5.9 | null | null | null |
CVE-2022-24870 | Stored Cross-site Scripting in Combodo iTop | Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:combodo:itop:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:beta2:*:*:*:*:*:*"
] | null | 8.7 | null | null |
CVE-2022-32215 | The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS). | [
"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2010-1702 | SQL injection vulnerability in submitticket.php in WHMCompleteSolution (WHMCS) 4.2 allows remote attackers to execute arbitrary SQL commands via the deptid parameter. | [
"cpe:2.3:a:whmcs:whmcs:4.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-3960 | Multiple unspecified vulnerabilities in IBM WebSphere Application Server (WAS) before Fix Pack 21 (6.0.2.21) have unknown impact and attack vectors, aka (1) PK33799, or (2) a "Potential security exposure" in the Samples component (PK40213). | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2017:0444 | Red Hat Security Advisory: rpm-ostree and rpm-ostree-client security, bug fix, and enhancement update | rpm-ostree-client: fails to check gpg package signatures when layering | [
"cpe:/a:redhat:rhel_atomic:7"
] | null | null | 5.3 | null |
GHSA-5mrw-gf6v-xxgp | IBM WebSphere Message Broker Toolkit 7 before 7007 IF2 and 8 before 8005 IF1 and Integration Toolkit 9 before 9003 IF1 are distributed with MQ client JAR files that support only weak TLS ciphers, which might make it easier for remote attackers to obtain sensitive information by sniffing the network during a connection to an Integration Bus node. | [] | null | null | null | null |
|
GHSA-74x3-8qc5-7wpm | The Gosign – Posts Slider Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'posts-slider-block' block in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2009-1106 | The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948. | [
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-gf69-6hf2-hp8v | Heap-based buffer overflow in the Microsoft Word document conversion feature in Corel WordPerfect allows remote attackers to execute arbitrary code via a crafted document. | [] | null | null | null | null |
|
cisco-sa-tms-xss-vuln-WbTcYwxG | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
There are no workarounds that address this vulnerability.
| [] | null | 4.6 | null | null |
CVE-2024-48629 | D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. | [
"cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*"
] | null | 8 | null | null |
|
CVE-2021-1024 | In onEventReceived of EventResultPersister.java, there is a possible intent redirection due to a confused deputy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-191283525 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2007-1974 | SQL injection vulnerability in the getArticle function in class/wfsarticle.php in WF-Section (aka WF-Sections) 1.0.1, as used in Xoops modules such as (1) Zmagazine 1.0, (2) Happy Linux XFsection 1.07 and earlier, and possibly other modules, allows remote attackers to execute arbitrary SQL commands via the articleid parameter to print.php. | [
"cpe:2.3:a:wf-sections:wf-sections:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:happy_linux_xfsection_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:zmagazine_module:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-w2r7-9579-27hf | vLLM denial of service vulnerability | A flaw was found in the vLLM library. A completions API request with an empty prompt will crash the vLLM API server, resulting in a denial of service. | [] | 8.7 | 7.5 | null | null |
GHSA-95jc-3vhv-3739 | Cross Site Scripting vulnerability in eyouCMS v.1.6.7 allows a remote attacker to obtain sensitive information via a crafted script to the post parameter. | [] | null | 6.1 | null | null |
|
CVE-2018-2462 | In certain cases, BEx Web Java Runtime Export Web Service in SAP NetWeaver BI 7.30, 7.31. 7.40, 7.41, 7.50, does not sufficiently validate an XML document accepted from an untrusted source. | [
"cpe:2.3:a:sap:netweaver:7.30:*:*:*:business_intelligence:*:*:*",
"cpe:2.3:a:sap:netweaver:7.31:*:*:*:business_intelligence:*:*:*",
"cpe:2.3:a:sap:netweaver:7.40:*:*:*:business_intelligence:*:*:*",
"cpe:2.3:a:sap:netweaver:7.41:*:*:*:business_intelligence:*:*:*",
"cpe:2.3:a:sap:netweaver:7.50:*:*:*:business_intelligence:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-5mq4-x9g5-4vc4 | In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name. | [] | null | 9.8 | null | null |
|
CVE-2019-2657 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2019:3833 | Red Hat Security Advisory: kernel-rt security update | hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 6.5 | null |
RHSA-2024:0012 | Red Hat Security Advisory: firefox security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
CVE-2020-19786 | File upload vulnerability in CSKaza CSZ CMS v.1.2.2 fixed in v1.2.4 allows attacker to execute aritrary commands and code via crafted PHP file. | [
"cpe:2.3:a:cszcms:csz_cms:1.2.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-48w4-p6h2-6g53 | The HTTP service in EServ/3 3.25 allows remote attackers to obtain sensitive information via crafted HTTP requests containing dot, space, and slash characters, which reveals the source code of script files. | [] | null | null | null | null |
|
CVE-2022-23012 | On BIG-IP versions 15.1.x before 15.1.4.1 and 14.1.x before 14.1.4.5, when the HTTP/2 profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.1 |
|
CVE-2024-33577 | A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain a stack overflow vulnerability while parsing specially strings as argument for one of the application binaries. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*"
] | 7.3 | 7.8 | null | null |
|
GHSA-4p6f-vmpg-88hm | Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | 8.8 | null | null |
|
GHSA-555q-7wq3-w6ch | An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level. | [] | null | 8.6 | null | null |
|
GHSA-xj85-gxf6-hq98 | The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size. | [] | null | null | null | null |
|
CVE-2025-27483 | NTFS Elevation of Privilege Vulnerability | Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | [] | null | 7.8 | null | null |
GHSA-9pv8-q5rx-c8gq | django_make_app is vulnerable to Code Injection | An exploitable vulnerability exists in the YAML parsing functionality in the `read_yaml_file` method in `io_utils.py` in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. | [] | 9.3 | 9.8 | null | null |
CVE-2019-10369 | A missing permission check in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:jclouds:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.