id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-6jhm-w7qq-9788
Cross-Site Request Forgery (CSRF) vulnerability in Whydonate Whydonate – FREE Donate button – Crowdfunding – Fundraising plugin <= 3.12.15 versions.
[]
null
4.3
null
null
null
CVE-2012-2527
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2025-37831
cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()
In the Linux kernel, the following vulnerability has been resolved: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() cpufreq_cpu_get_raw() can return NULL when the target CPU is not present in the policy->cpus mask. apple_soc_cpufreq_get_rate() does not check for this case, which results in a NULL pointer dereference.
[]
null
null
null
null
null
CVE-2020-19451
SQL injection exists in the jdownloads 3.2.63 component for Joomla! via com_jdownloads/helpers/jdownloadshelper.php, updateLog function via the X-forwarded-for Header parameter.
[ "cpe:2.3:a:jdownloads:jdownloads:3.2.63:*:*:*:*:joomla\\!:*:*" ]
null
7.5
null
5
null
CVE-2024-23348
Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file.
[ "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2021-39251
A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G < 2021.8.22.
[ "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
null
GHSA-8fc5-f67m-p222
Microsoft Internet Explorer 6 allows remote attackers to spoof the URL bar, and page properties including SSL certificates, by interrupting page loading through certain use of location DOM objects and setTimeout calls. NOTE: this issue can be leveraged for phishing and other attacks.
[]
null
null
null
null
null
CVE-2025-31875
WordPress FancyPost plugin <= 6.0.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluginic FancyPost allows DOM-Based XSS. This issue affects FancyPost: from n/a through 6.0.1.
[]
null
6.5
null
null
null
CVE-2009-1723
CFNetwork in Apple Mac OS X 10.5 before 10.5.8 places an incorrect URL in a certificate warning in certain 302 redirection scenarios, which makes it easier for remote attackers to trick a user into visiting an arbitrary https web site by leveraging an open redirect vulnerability, a different issue than CVE-2009-2062.
[ "cpe:2.3:a:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-7644-cxp8-h23r
ibexa/admin-ui vulnerable to Cross-site Scripting in content type name/shortname
Critical severity. It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fix ensures any injections are escaped.
[]
null
null
null
null
null
CVE-2024-28567
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the FreeImage_CreateICCProfile() function when reading images in TIFF format.
[ "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
null
CVE-2018-2635
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Login). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.7:*:*:*:*:*:*:*" ]
null
null
4.8
5.8
null
GHSA-327v-v4jp-xxvm
GROWI v4.1.3 and earlier allow remote attackers to obtain information which is not allowed to access via unspecified vectors.
[]
null
null
null
null
null
CVE-2019-19100
Privilege escalation via B&R Automation Studio upgrade service
A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.4SP, <. 4.6.3SP, < 4.7.2 and < 4.8.1 allow authenticated users to delete arbitrary files via an exposed interface.
[ "cpe:2.3:a:br-automation:automation_studio:*:*:*:*:*:*:*:*", "cpe:2.3:a:br-automation:automation_studio:4.8:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2021-28925
SQL injection vulnerability in Nagios Network Analyzer before 2.4.3 via the o[col] parameter to api/checks/read/.
[ "cpe:2.3:a:nagios:network_analyzer:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-gx3m-44w2-wmgh
A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
7.4
8.8
null
null
null
cisco-sa-20190306-nxos-privesca
Cisco NX-OS Software Privilege Escalation Vulnerability
A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca"] This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-70757"].
[]
null
null
7.3
null
null
CVE-2023-43757
Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section.
[ "cpe:2.3:o:elecom:wrc-2533ghbk2-t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533ghbk2-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750ghbk2-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750ghbk2-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750ghbk-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750ghbk-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750ghbk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750ghbk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167ghbk2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167ghbk2:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167ghbk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167ghbk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-f1167acf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-f1167acf:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-733ghbk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-733ghbk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-733ghbk-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-733ghbk-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-733ghbk-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-733ghbk-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-300ghbk2-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-300ghbk2-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-300ghbk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-300ghbk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-733febk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-733febk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-300febk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-300febk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-f300nf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-f300nf:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300wh-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300wh-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300bk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300bk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300rd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300rd:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300sv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300sv:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300bk-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300bk-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300wh-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300wh-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300bk2-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300bk2-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-300wh2-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-300wh2-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-h300bk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-h300bk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-h300wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-h300wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-150bk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-150bk:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrh-150wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrh-150wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-w300n\\/rs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-w300n\\/rs:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-w301nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-w301nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-w300n\\/p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-w300n\\/p:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-wh300n\\/dgp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-wh300n\\/dgp:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-wh300ndgpe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-wh300ndgpe:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-34r3-v64f-c8m6
Cross-site request forgery (CSRF) vulnerability on Cisco DPQ3925 devices with EDVA 5.5.2 allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuv05943.
[]
null
null
null
null
null
RHSA-2019:1907
Red Hat Security Advisory: podman security, bug fix, and enhancement update
podman: Improper symlink resolution allows access to host files when executing `podman cp` on running containers
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
7.5
null
null
CVE-2005-1147
calendar.pl in CalendarScript 3.20 allows remote attackers to obtain sensitive information via invalid (1) calendar or (2) template parameters, which leaks the full pathname and debug information.
[ "cpe:2.3:a:calendarscript:calendarscript:3.20:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-fj3x-9wfg-92c4
An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket.
[]
null
null
null
null
null
CVE-2023-5389
An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
[ "cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
GHSA-j6qm-33q6-j5m5
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
[]
null
6.4
null
null
null
GHSA-22x5-xjpj-vgh2
novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability.
[]
null
7.5
null
null
null
GHSA-5hc5-fxr9-5frc
Duplicate Advisory: Mautic has insufficient authentication in upgrade flow
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-qf6m-6m4g-rmrc. This link is maintained to preserve external references.Original DescriptionMautic allows you to update the application via an upgrade script.The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.
[]
7.4
7.8
null
null
null
CVE-2022-49342
net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
[]
null
5.5
null
null
null
GHSA-rggh-c47v-5wh6
This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to view sensitive information on the targeted device.
[]
null
7.5
null
null
null
GHSA-8qx3-w8w8-2547
Cross-Site Request Forgery (CSRF) vulnerability in WPJohnny, zerOneIT Comment Reply Email allows Cross-Site Scripting (XSS).This issue affects Comment Reply Email: from n/a through 1.3.
[]
null
7.1
null
null
null
CVE-2024-32877
Reflected Cross-site Scripting in yiisoft/yii2 Debug mode
Yii 2 is a PHP application framework. During internal penetration testing of a product based on Yii2, users discovered a Cross-site Scripting (XSS) vulnerability within the framework itself. This issue is relevant for the latest version of Yii2 (2.0.49.3). This issue lies in the mechanism for displaying function argument values in the stack trace. The vulnerability manifests when an argument's value exceeds 32 characters. For convenience, argument values exceeding this limit are truncated and displayed with an added "...". The full argument value becomes visible when hovering over it with the mouse, as it is displayed in the title attribute of a span tag. However, the use of a double quote (") allows an attacker to break out of the title attribute's value context and inject their own attributes into the span tag, including malicious JavaScript code through event handlers such as onmousemove. This vulnerability allows an attacker to execute arbitrary JavaScript code in the security context of the victim's site via a specially crafted link. This could lead to the theft of cookies (including httpOnly cookies, which are accessible on the page), content substitution, or complete takeover of user accounts. This issue has been addressed in version 2.0.50. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
null
4.2
null
null
null
CVE-2025-7426
MINOVA TTA Information Disclosure and Credential Exposure
Information disclosure and exposure of authentication FTP credentials over the debug port 1604 in the MINOVA TTA service. This allows unauthenticated remote access to an active FTP account containing sensitive internal data and import structures. In environments where this FTP server is part of automated business processes (e.g. EDI or data integration), this could lead to data manipulation, extraction, or abuse.  Debug ports 1602, 1603 and 1636 also expose service architecture information and system activity logs
[]
9.3
null
null
null
null
CVE-2024-46419
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter.
[ "cpe:2.3:o:totolink:ac1200_t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2016-10735
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
[ "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "cpe:2.3:a:getbootstrap:bootstrap:4.0.0:beta:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-pxcv-8qw9-hg5h
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
[]
null
null
null
null
null
GHSA-w525-rw9x-grpj
An issue was discovered on Samsung mobile devices with M(6.0) software. The S/MIME implementation in EAS uses DES (where 3DES is intended). The Samsung ID is SVE-2016-5871 (June 2016).
[]
null
null
null
null
null
GHSA-946f-3923-rpgp
SQL injection vulnerability in index.php in iWare Professional 5.0.4, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the D parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2008-0283
PHP remote file inclusion vulnerability in /aides/index.php in DomPHP 0.81 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.
[ "cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2001-0879
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.
[ "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-45355
WordPress WP Pipes Plugin <= 1.33 is vulnerable to SQL Injection (SQLi)
Auth. (admin+) SQL Injection (SQLi) vulnerability in ThimPress WP Pipes plugin <= 1.33 versions.
[ "cpe:2.3:a:thimpress:wp_pipes:*:*:*:*:*:wordpress:*:*" ]
null
8.2
null
null
null
CVE-2021-32555
apport read_file() function could follow maliciously constructed symbolic links
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
[ "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2005-3757
The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
[ "cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-0780
Improper Restriction of Rendered UI Layers or Frames in cockpit-hq/cockpit
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9-dev.
[ "cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*" ]
null
null
4
null
null
GHSA-hjcf-2x24-xf9r
SQL injection vulnerability in the JoomlaMe AgoraGroups (aka AG or com_agoragroup) component 0.3.5.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a groupdetail action to index.php.
[]
null
null
null
null
null
GHSA-3724-4mmc-j59x
NoMachine Enterprise Desktop is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[]
null
null
null
null
null
GHSA-95mq-j929-phwr
The sermon-browser plugin before 0.45.16 for WordPress has multiple XSS issues.
[]
null
null
6.1
null
null
CVE-2023-24278
Squidex before 7.4.0 was discovered to contain a squid.svg cross-site scripting (XSS) vulnerability.
[ "cpe:2.3:a:squidex.io:squidex:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2023-47994
An integer overflow vulnerability in LoadPixelDataRLE4 function in PluginBMP.cpp in Freeimage 3.18.0 allows attackers to obtain sensitive information, cause a denial of service and/or run arbitrary code.
[ "cpe:2.3:a:freeimage_project:freeimage:3.18.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2015-8596
In all Qualcomm products with Android releases from CAF using the Linux kernel, validation of buffer lengths is missing in malware protection.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-phfj-2mq7-qmg7
A SQL injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
[]
null
8.8
null
null
null
GHSA-mcv6-9g7q-49rc
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->twin().
[]
null
8.8
null
null
null
GHSA-97vg-w35f-v8mj
A vulnerability in the remote management feature of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands and potentially gain elevated privileges. The vulnerability is due to improper validation of commands to the remote management CLI of the affected application. An attacker could exploit this vulnerability by sending malicious requests to the affected application. A successful exploit could allow the attacker to inject arbitrary commands and potentially gain elevated privileges.
[]
null
null
null
null
null
CVE-2018-16149
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.
[ "cpe:2.3:a:axtls_project:axtls:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-vqfr-h8mv-ghfj
h11 accepts some malformed Chunked-Encoding bodies
ImpactA leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions.DetailsHTTP/1.1 Chunked-Encoding bodies are formatted as a sequence of "chunks", each of which consists of:chunk length`\r\n``length` bytes of content`\r\n`In versions of h11 up to 0.14.0, h11 instead parsed them as:chunk length`\r\n``length` bytes of contentany two bytesi.e. it did not validate that the trailing `\r\n` bytes were correct, and if you put 2 bytes of garbage there it would be accepted, instead of correctly rejecting the body as malformed.By itself this is harmless. However, suppose you have a proxy or reverse-proxy that tries to analyze HTTP requests, and your proxy has a _different_ bug in parsing Chunked-Encoding, acting as if the format is:chunk length`\r\n``length` bytes of contentmore bytes of content, as many as it takes until you find a `\r\n`For example, [pound](https://github.com/graygnuorg/pound/pull/43) had this bug -- it can happen if an implementer uses a generic "read until end of line" helper to consumes the trailing `\r\n`.In this case, h11 and your proxy may both accept the same stream of bytes, but interpret them differently. For example, consider the following HTTP request(s) (assume all line breaks are `\r\n`):Here h11 will interpret it as two requests, one with body `AAAAA45` and one with an empty body, while our hypothetical buggy proxy will interpret it as a single request, with body `AAAAXX20\r\n\r\nGET /two ...`. And any time two HTTP processors both accept the same string of bytes but interpret them differently, you have the conditions for a "request smuggling" attack. For example, if `/two` is a dangerous endpoint and the job of the reverse proxy is to stop requests from getting there, then an attacker could use a bytestream like the above to circumvent this protection.Even worse, if our buggy reverse proxy receives two requests from different users:...it will consider the first request to be complete and valid, and send both on to the h11-based web server over the same socket. The server will then see the two concatenated requests, and interpret them as _one_ request to `/one` whose body includes `/two`'s session key, potentially allowing one user to steal another's credentials.PatchesFixed in h11 0.15.0.WorkaroundsSince exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.CreditsReported by Jeppe Bonde Weikop on 2025-01-09.
[]
null
9.1
null
null
null
CVE-2019-2778
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*" ]
null
5.4
null
5.5
null
RHSA-2023:5741
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
null
GHSA-h5x8-4pmq-84wh
A potential security vulnerability has been identified in HPE Content Manager Workgroup Service v9.00. The vulnerability could be remotely exploited to allow Denial of Service (DoS).
[]
null
null
7.5
null
null
CVE-2023-51281
Cross Site Scripting vulnerability in Customer Support System v.1.0 allows a remote attacker to escalate privileges via a crafted script firstname, "lastname", "middlename", "contact" and address parameters.
[ "cpe:2.3:a:sourcecodester:customer_support_system:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
ICSA-17-143-01
Moxa OnCell
An attacker can freely use brute force to determine parameters needed to bypass authentication.CVE-2017-7915 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The application 's configuration file contains parameters that represent passwords in plaintext.CVE-2017-7913 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The application does not sufficiently verify if a request was intentionally provided by the user who submitted the request, which could allow an attacker to modify the configuration of the device.CVE-2017-7917 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
null
CVE-2002-0388
Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
[ "cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-m735-7hwx-p6mj
The (1) alloc and (2) free APIs in arch/arm/mach-msm/qdsp6v2/msm_audio_ion.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices do not validate parameters, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28749392 and Qualcomm internal bug CR556425.
[]
null
null
7.8
null
null
CVE-2022-49289
uaccess: fix integer overflow on access_ok()
In the Linux kernel, the following vulnerability has been resolved: uaccess: fix integer overflow on access_ok() Three architectures check the end of a user access against the address limit without taking a possible overflow into account. Passing a negative length or another overflow in here returns success when it should not. Use the most common correct implementation here, which optimizes for a constant 'size' argument, and turns the common case into a single comparison.
[]
null
null
null
null
null
GHSA-4fhw-m656-mf22
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.
[]
null
null
null
null
null
GHSA-6q5r-8qc5-j49x
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
[]
null
null
5.9
null
null
GHSA-8rhh-mg2p-8fh8
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
[]
null
null
null
null
null
GHSA-px7c-jj68-w4g3
JTBC(PHP) 3.0.1.8 allows Arbitrary File Upload via the console/#/console/file/manage.php?type=list URI, as demonstrated by a .php file.
[]
null
null
7.5
null
null
GHSA-694v-63fq-fmr4
Path Traversal in scout-browser
Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52.
[]
null
null
6.8
null
null
GHSA-5rjj-9q9r-jq74
An issue was discovered in libgig 4.1.0. There is an out-of-bounds read in the function RIFF::Chunk::Read in RIFF.cpp.
[]
null
null
8.8
null
null
GHSA-r947-2crg-xc39
ouqiang gocron Cross-site scripting vulnerability
Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue.
[]
null
6.1
null
null
null
GHSA-4g7j-ccqc-2759
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of a license-deny response to a license grant. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.
[]
null
null
7.8
null
null
CVE-2009-1007
Unspecified vulnerability in the Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality, integrity, and availability, related to SYS.DMP_SYS.
[ "cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2008-3262
Cross-site request forgery (CSRF) vulnerability in Claroline before 1.8.10 allows remote attackers to change passwords, related to lack of a requirement for the previous password.
[ "cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.8.8:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-v9qx-jfm7-6ggw
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server : Security : Firewall). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.4
null
null
null
ICSA-22-307-03
Delta Industrial Automation DIALink
The software uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within the pathname, which can cause the pathname to resolve to a location outside of the restricted directory.CVE-2022-2969 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
[]
null
null
8.1
null
null
CVE-2016-2074
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
[ "cpe:2.3:a:openvswitch:openvswitch:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openvswitch:openvswitch:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:openvswitch:openvswitch:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:openvswitch:openvswitch:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:openvswitch:openvswitch:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*" ]
null
null
9.8
7.5
null
GHSA-xw2w-mmgv-hf8h
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.
[]
null
null
null
null
null
GHSA-c9v9-g76v-wf6p
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow XSS.
[]
null
null
4.8
null
null
GHSA-7g9x-54rv-3848
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
[]
null
null
null
null
null
GHSA-2p7x-jcr3-7p2c
Improper Authentication in Apache CXF
The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request.
[]
null
null
9.8
null
null
CVE-2024-23775
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
[ "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
ICSA-18-051-01
ABB netCADOPS Web Application
A vulnerability exists in the password entry section of netCADOPS Web Application that may expose critical database information. CVE-2018-5477 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).
[]
null
null
5.8
null
null
CVE-2018-5048
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
RHSA-2024:4035
Red Hat Security Advisory: ovn-2021 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
null
GHSA-qm4q-mvq2-gj2r
A buffer overflow vulnerability in the “fbwifi_forward.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.30 through 5.35, USG20(W)-VPN firmware versions 4.30 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote unauthenticated attacker to cause DoS conditions by sending a crafted HTTP request if the Facebook WiFi function were enabled on an affected device.
[]
null
7.5
null
null
null
GHSA-hfcf-79gh-f3jc
Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs
The Memos application, up to version v0.24.3, allows for the embedding of markdown images with arbitrary URLs. When a user views a memo containing such an image, their browser automatically fetches the image URL without explicit user consent or interaction beyond viewing the memo. This can be exploited by an attacker to disclose the viewing user's IP address, browser User-Agent string, and potentially other request-specific information to the attacker-controlled server, leading to information disclosure and user tracking.
[]
5.2
null
null
null
null
CVE-2022-25337
Ibexa DXP ezsystems/ezpublish-kernel 7.5.x before 7.5.26 and 1.3.x before 1.3.12 allows injection attacks via image filenames.
[ "cpe:2.3:a:ibexa:ez_platform_kernel:*:*:*:*:*:*:*:*" ]
null
9.8
null
6.8
null
cisco-sa-ipv4uni-LfM3cfBu
Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability
A vulnerability in the IPv4 access control list (ACL) feature and quality of service (QoS) policy feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of malformed IPv4 packets that are received on line cards where the interface has either an IPv4 ACL or QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to cause network processor errors, resulting in a reset or shutdown of the network process. Traffic over that line card would be lost while the line card reloads. Note: This vulnerability has predominantly been observed in Layer 2 VPN (L2VPN) environments where an IPv4 ACL or QoS policy has been applied to the bridge virtual interface. Layer 3 configurations where the interface has either an IPv4 ACL or QoS policy applied are also affected, though the vulnerability has not been observed. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. There are mitigations that address this vulnerability. This advisory is part of the March 2025 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2025 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75548"].
[]
null
8.6
null
null
null
GHSA-g7w9-8ww6-vhhw
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Paypal Payments plugin <= 5.7.25 versions.
[]
null
6.5
null
null
null
GHSA-f5g6-55mc-jx72
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
[]
null
null
null
null
null
CVE-2022-37978
Windows Active Directory Certificate Services Security Feature Bypass
Windows Active Directory Certificate Services Security Feature Bypass
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2013-5779
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote authenticated users to affect confidentiality via vectors related to PIA Core Technology.
[ "cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-qqmh-j364-hj2g
Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
[]
null
null
null
null
null
GHSA-vff7-9xgm-4ggq
An issue in Teamwire Windows desktop client v.2.0.1 through v.2.4.0 allows a remote attacker to obtain sensitive information via a crafted payload to the message function.
[]
null
7.5
null
null
null
GHSA-r57p-9vwh-hqg7
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24629.
[]
null
null
7.8
null
null
GHSA-4qhm-v7jj-gh6g
Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.
[]
null
null
null
null
null
CVE-2018-10199
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
[ "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2012-4554
The OpenID module in Drupal 7.x before 7.16 allows remote OpenID servers to read arbitrary files via a crafted DOCTYPE declaration in an XRDS file.
[ "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2020:4285
Red Hat Security Advisory: rh-python36 security, bug fix, and enhancement update
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: CRLF injection via the host part of the url passed to urlopen() python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes python: CRLF injection via HTTP request method in httplib/http.client
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
6.5
null
null
GHSA-w6q7-j642-7c25
vLLM has a Regular Expression Denial of Service (ReDoS, Exponential Complexity) Vulnerability in `pythonic_tool_parser.py`
SummaryA Regular Expression Denial of Service (ReDoS) vulnerability exists in the file [`vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py`](https://github.com/vllm-project/vllm/blob/main/vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py) of the vLLM project. The root cause is the use of a highly complex and nested regular expression for tool call detection, which can be exploited by an attacker to cause severe performance degradation or make the service unavailable.DetailsThe following regular expression is used to match tool/function call patterns:This pattern contains multiple nested quantifiers (`*`, `+`), optional groups, and inner repetitions which make it vulnerable to catastrophic backtracking.**Attack Example:** A malicious input such ascan cause the regular expression engine to consume CPU exponentially with the input length, effectively freezing or crashing the server (DoS).**Proof of Concept:** A Python script demonstrates that matching such a crafted string with the above regex results in exponential time complexity. Even moderate input lengths can bring the system to a halt.Impact**Denial of Service (DoS):** An attacker can trigger a denial of service by sending specially crafted payloads to any API or interface that invokes this regex, causing excessive CPU usage and making the vLLM service unavailable.**Resource Exhaustion and Memory Retention:** As this regex is invoked during function call parsing, the matching process may hold on to significant CPU and memory resources for extended periods (due to catastrophic backtracking). In the context of vLLM, this also means that the associated KV cache (used for model inference and typically stored in GPU memory) is not released in a timely manner. This can lead to GPU memory exhaustion, degraded throughput, and service instability.**Potential for Broader System Instability:** Resource exhaustion from stuck or slow requests may cascade into broader system instability or service downtime if not mitigated.Fixhttps://github.com/vllm-project/vllm/pull/18454Note that while this change has significantly improved performance, this regex may still be problematic. It has gone from exponential time complexity, O(2^N), to O(N^2).
[]
null
6.5
null
null
null
CVE-2022-1511
Missing Authorization in snipe/snipe-it
Missing Authorization in GitHub repository snipe/snipe-it prior to 5.4.4.
[ "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
GHSA-7763-j2c2-xh5f
SQL injection vulnerability in index.php in BugPort 1.147 allows remote attackers to execute arbitrary SQL commands via the (1) devWherePair[0], (2) orderBy, and (3) where parameters.
[]
null
null
null
null
null