id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-23760
|
Cleartext Storage of Sensitive Information in Gambio 4.9.2.0 allows attackers to obtain sensitive information via error-handler.log.json and legacy-error-handler.log.txt under the webroot.
|
[
"cpe:2.3:a:gambio:gambio:4.9.2.0:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
|
GHSA-hjgh-mjrj-x6h8
|
Unspecified vulnerability in IBM Rational ClearQuest (CQ), when a Microsoft SQL Server or an IBM DB2 database is used, allows attackers to corrupt data via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-45146
|
An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.
|
[
"cpe:2.3:a:bouncycastle:fips_java_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2025:1908
|
Red Hat Security Advisory: OpenShift Container Platform 4.18.2 packages and security update
|
cri-o: Checkpoint restore can be triggered from different namespaces podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile
|
[
"cpe:/a:redhat:openshift:4.18::el8",
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 8.6 | null | null | null |
GHSA-pw9x-xf3r-gvf9
|
Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the equipment description component within /equipment/ component.
|
[] | null | 5.4 | null | null | null |
|
GHSA-mrmx-w3x5-x556
|
Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: User Management). Supported versions that are affected are 7.4.0 and 7.4.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | 4.3 | null | null | null |
|
GHSA-whhx-238v-wr87
|
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token.Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS
|
[] | null | 4.9 | null | null | null |
|
CVE-2025-21439
|
Out-of-bounds Read in Windows WLAN Host
|
Memory corruption may occur while reading board data via IOCTL call when the WLAN driver copies the content to the provided output buffer.
|
[] | null | 7.8 | null | null | null |
CVE-2013-0200
|
HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/hpcupsfilterc_#.bmp, (2) /tmp/hpcupsfilterk_#.bmp, (3) /tmp/hpcups_job#.out, (4) /tmp/hpijs_#####.out, or (5) /tmp/hpps_job#.out temporary file, a different vulnerability than CVE-2011-2722.
|
[
"cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
GHSA-g2x7-2429-c3m5
|
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in PHPEcho CMS 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the (1) _plugin_file parameter to smarty/internals/core.load_pulgins.php or the (2) root_path parameter to index.php. NOTE: CVE disputes (1) because the inclusion occurs within a function that is not called during a direct request. CVE disputes (2) because root_path is defined in config.php before use.
|
[] | null | null | null | null | null |
|
GHSA-vpfc-r6w9-mf39
|
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
|
[] | null | null | 5.9 | null | null |
|
RHSA-2020:0322
|
Red Hat Security Advisory: php:7.2 security update
|
php: underflow in env_path_info in fpm_main.c
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 8.1 | null | null |
CVE-2016-6811
|
In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
|
[
"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-ghmm-93ww-fvhh
|
Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
|
[] | null | null | 8.1 | null | null |
|
GHSA-r83j-cv9v-w899
|
Directory traversal vulnerability in report/reportViewAction.jsp in Progress Software OpenEdge 11.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the selection parameter.
|
[] | null | null | null | null | null |
|
GHSA-67jg-mxq3-434p
|
The affected product is vulnerable to an information leak, which may allow an attacker to obtain sensitive information on the Ignition 8 (all versions prior to 8.0.13).
|
[] | null | null | null | null | null |
|
CVE-2024-33147
|
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the authRoleList function.
|
[
"cpe:2.3:a:j2eefast:j2eefast:2.7.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-1999-0739
|
The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2002-2092
|
Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
|
[
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
CVE-2025-8466
|
code-projects Online Farm System forgot_passfarmer.php sql injection
|
A vulnerability was found in code-projects Online Farm System 1.0. It has been classified as critical. Affected is an unknown function of the file /forgot_passfarmer.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2018-3840
|
A denial-of-service vulnerability exists in the Pixar Renderman IT Display Service 21.6 (0x67). The vulnerability is present in the parsing of a network packet without proper validation of the packet. The data read by the application is not validated, and its use can lead to a null pointer dereference. The IT application is opened by a user and then listens for a connection on port 4001. An attacker can deliver an attack once the application has been opened.
|
[
"cpe:2.3:a:pixar:renderman:21.6:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
|
GHSA-6c4q-j8wj-wf2x
|
The Management Console in WSO2 API Manager through 3.1.0 and API Microgateway 2.2.0 allows XML External Entity injection (XXE) attacks.
|
[] | null | null | null | null | null |
|
CVE-2023-42366
|
A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the next_token function at awk.c:1159.
|
[
"cpe:2.3:a:busybox:busybox:1.36.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2018-14689
|
An issue was discovered in Subsonic 6.1.1. The transcoding settings are affected by five stored cross-site scripting vulnerabilities in the name[x], sourceformats[x], targetFormat[x], step1[x], and step2[x] parameters (where x is an integer) to transcodingSettings.view that could be used to steal session information of a victim.
|
[
"cpe:2.3:a:subsonic:subsonic:6.1.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2018-7632
|
Buffer Overflow in httpd in EpiCentro E_7.3.2+ allows attackers to cause a denial of service attack remotely via a specially crafted GET request with a leading "/" in the URL.
|
[
"cpe:2.3:o:adbglobal:epicentro:7.3.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-w6hq-vc4w-c343
|
Cross-site scripting (XSS) vulnerability in EMC ViPR SRM before 4.0.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | 5.4 | null | null |
|
GHSA-7859-xr5m-mmp7
|
Adobe Connect versions 12.8 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
CVE-2002-1484
|
DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message.
|
[
"cpe:2.3:a:siemens:db4web:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:db4web:3.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2018-4848
|
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
|
[
"cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x-200_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x-200_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-c425-6p5m-56mv
|
The eDocument Conversion Actions implementation in IBM Datacap Taskmaster Capture 8.0.1 FP1 and earlier allows remote attackers to cause a denial of service (batch abort) via a long subject line in an e-mail message that is represented in a .eml file.
|
[] | null | null | null | null | null |
|
CVE-2025-3252
|
xujiangfei admintwo add cross site scripting
|
A vulnerability has been found in xujiangfei admintwo 1.0 and classified as problematic. This vulnerability affects unknown code of the file /resource/add. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
CVE-2015-2191
|
Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vqfm-8v92-x8j8
|
A vulnerability has been identified in Solid Edge SE2022 (All versions < V2210Update12), Solid Edge SE2023 (All versions < V2023Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
GHSA-5g6f-wfx8-qr4f
|
Buffer overflow in the Matroska demuxer (demuxers/demux_matroska.c) in xine-lib before 1.1.10.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Matroska file with invalid frame sizes.
|
[] | null | null | null | null | null |
|
GHSA-p25h-w2rq-v3cw
|
A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files.
|
[] | null | 5.3 | null | null | null |
|
GHSA-r992-6q98-c5vh
|
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0581, CVE-2014-8440, and CVE-2014-8441.
|
[] | null | null | null | null | null |
|
CVE-2022-2356
|
User Private Files < 1.1.3 - Subscriber+ Arbitrary File Upload
|
The Frontend File Manager & Sharing WordPress plugin before 1.1.3 does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded.
|
[
"cpe:2.3:a:mediajedi:user_private_files:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
GHSA-32gq-pfjx-x48v
|
An unspecified action handler in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to read arbitrary files via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-chm5-6f56-6fwp
|
Incorrect access control in Itel Electronics IP Stream v1.7.0.6 allows unauthorized attackers to execute arbitrary commands with Administrator privileges.
|
[] | null | 9.1 | null | null | null |
|
GHSA-wpxw-h4r4-3xjx
|
Cisco IOS 15.0 and 15.1 and IOS XE 3.x do not properly handle the "set mpls experimental imposition" command, which allows remote attackers to cause a denial of service (device crash) via network traffic that triggers (1) fragmentation or (2) reassembly, aka Bug ID CSCtr56576.
|
[] | null | null | null | null | null |
|
CVE-2014-6923
|
The Dubrovnik Guided Walking Tours (aka com.mytoursapp.android.app351) application 1.3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:mobitrips:dubrovnik_guided_walking_tours:1.3.2:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2024-54131
|
Kolide Agent Privilege Escalation (Windows, Versions >= 1.5.3, < 1.12.3)
|
The Kolide Agent (aka: Launcher) is the lightweight agent designed to work with Kolide's service. An implementation bug in the Kolide Agent (known as `launcher`) allows for local privilege escalation to the SYSTEM user on Windows 10 and 11. The bug was introduced in version 1.5.3 when launcher started storing upgraded binaries in the ProgramData directory. This move to the new directory meant the launcher root directory inherited default permissions that are not as strict as the previous location. These incorrect default permissions in conjunction with an omitted SystemDrive environmental variable (when launcher starts osqueryd), allows a malicious actor with access to the local Windows device to successfully place an arbitrary DLL into the osqueryd process's search path. Under some circumstances, this DLL will be executed when osqueryd performs a WMI query. This combination of events could then allow the attacker to escalate their privileges to SYSTEM. Impacted versions include versions >= 1.5.3 and the fix has been released in 1.12.3.
|
[
"cpe:2.3:a:kolide:launcher:*:*:*:*:*:*:*:*"
] | 7.3 | null | null | null | null |
CVE-2018-11092
|
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
|
[
"cpe:2.3:a:admin_notes_project:admin_notes:1.1:*:*:*:*:mybb:*:*"
] | null | null | 6.5 | 5.8 | null |
|
CVE-2024-30375
|
Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability
|
Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of KSP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22515.
|
[
"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-vc7q-73x4-cqqg
|
Microsoft Excel 2003 SP3 and 2007 SP2; Excel in Office 2007 SP2; Excel 2010 Gold and SP1; Excel in Office 2010 Gold and SP1; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; Excel Services on Office SharePoint Server 2007 SP2; Excel Services on Office SharePoint Server 2010 Gold and SP1; and Excel Web App 2010 Gold and SP1 do not properly parse conditional expressions associated with formatting requirements, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Conditional Expression Parsing Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2025-7324
|
IrfanView CADImage Plugin DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
IrfanView CADImage Plugin DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26430.
|
[] | null | null | 7.8 | null | null |
CVE-2017-12245
|
A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.
|
[
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 | null |
|
CVE-2023-1728
|
Unrestricted Upload of File with Dangerous Type in Fernus LMS
|
Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03.
|
[
"cpe:2.3:a:fernus:learning_management_systems:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2023-21782
|
3D Builder Remote Code Execution Vulnerability
|
3D Builder Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2024-53589
|
GNU objdump 2.43 is vulnerable to Buffer Overflow in the BFD (Binary File Descriptor) library's handling of tekhex format files.
|
[] | null | 8.4 | null | null | null |
|
GHSA-h66p-9m5v-v38w
|
Multiple Read overflows issue due to improper length check while decoding 3G attach accept/ SMS/ pdn connection reject/ esm data transport/ bearer modify context reject in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
|
[] | null | null | null | null | null |
|
GHSA-2chr-h4px-85v9
|
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, iOS 15.7.2 and iPadOS 15.7.2. An app may be able to read sensitive location information
|
[] | null | 5.5 | null | null | null |
|
GHSA-v596-fwhq-8x48
|
Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core
|
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
|
[] | null | null | 5.3 | null | null |
GHSA-p6rw-52m8-833j
|
Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Order and Service Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 5.4 | null | null | null |
|
RHSA-2021:2032
|
Red Hat Security Advisory: slapi-nis security and bug fix update
|
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null | null |
GHSA-fpqg-p42r-7537
|
D-Link DAP-1325 SetTriggerAPValidate Key Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18839.
|
[] | null | null | 8.8 | null | null |
|
GHSA-8gx6-q6q9-c678
|
Mesa Labs AmegaView Versions 3.0 and prior’s passcode is generated by an easily reversible algorithm, which may allow an attacker to gain access to the device.
|
[] | null | null | null | null | null |
|
CVE-2011-0445
|
The ASN.1 BER dissector in Wireshark 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (assertion failure) via crafted packets, as demonstrated by fuzz-2010-12-30-28473.pcap.
|
[
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2019:1142
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: eap-pwd: fake authentication using reflection freeradius: eap-pwd: authentication bypass via an invalid curve attack
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null | null |
cisco-sa-vmesh-openred-AGNRmf5
|
Cisco Webex Video Mesh Arbitrary Site Redirection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.
This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.4 | null | null | null |
GHSA-hp2q-qh64-cgfw
|
The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow remote attackers to perform actions with the privileges of an authenticated user, provided the targeted user has an active session and is induced into clicking on a malicious link or into visiting a malicious website, aka CSRF.
|
[] | null | null | 8.8 | null | null |
|
GHSA-v2rp-vjv7-vgq4
|
The Web server in 3CX version 15.5.8801.3 is vulnerable to Information Leakage, because of improper error handling in Stack traces, as demonstrated by discovering a full pathname.
|
[] | null | null | 5.3 | null | null |
|
GHSA-rprf-22xr-7gr9
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
CVE-2018-15423
|
Cisco HyperFlex UI Clickjacking Vulnerability
|
A vulnerability in the web UI of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.
|
[
"cpe:2.3:a:cisco:hyperflex_hx_data_platform:2.6\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:hyperflex_hx_data_platform:3.0\\(1a\\):*:*:*:*:*:*:*"
] | null | 4.7 | null | 4.3 | null |
RHSA-2016:0379
|
Red Hat Security Advisory: rhev-hypervisor security, bug fix and enhancement update
|
OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: Side channel attack on modular exponentiation OpenSSL: Double-free in DSA code OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null | null |
CVE-2025-6710
|
Pre-authentication Denial of Service Stack Overflow Vulnerability in JSON Parsing via Excessive Recursion in MongoDB
|
MongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.
The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.
|
[
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-5589-2667-wwgx
|
kcheckpass passes a user-supplied argument to the pam_start function, often within a setuid environment, which allows local users to invoke any configured PAM stack, and possibly trigger unintended side effects, via an arbitrary valid PAM service name, a different vulnerability than CVE-2011-4122. NOTE: the vendor indicates that the possibility of resultant privilege escalation may be "a bit far-fetched."
|
[] | null | null | null | null | null |
|
CVE-2019-15590
|
An access control issue exists in < 12.3.5, < 12.2.8, and < 12.1.14 for GitLab Community Edition (CE) and Enterprise Edition (EE) where private merge requests and issues would be disclosed with the Group Search feature provided by Elasticsearch integration
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2005-3890
|
Gadu-Gadu 7.20 allows remote attackers to cause a denial of service (crash and configuration loss) via a page with a large number of gg: URIs.
|
[
"cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:7.20:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-mccm-p9hj-f8fq
|
Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.
|
[] | null | null | null | null | null |
|
CVE-2025-7540
|
code-projects Online Appointment Booking System getclinic.php sql injection
|
A vulnerability, which was classified as critical, was found in code-projects Online Appointment Booking System 1.0. Affected is an unknown function of the file /getclinic.php. The manipulation of the argument townid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-j4xj-pqpq-7cfq
|
Cisco IOS XE 3.2 through 3.4 before 3.4.2S, and 3.5, on 1000 series Aggregation Services Routers (ASR), when bridge domain interface (BDI) is enabled, allows remote attackers to cause a denial of service (card reload) via packets that are not properly handled during the processing of encapsulation, aka Bug ID CSCtt11558.
|
[] | null | null | null | null | null |
|
GHSA-v794-phw4-rmx7
|
An issue was discovered in Veritas NetBackup Flex Scale through 3.0. An attacker with non-root privileges may escalate privileges to root by using specific commands.
|
[] | null | 8.8 | null | null | null |
|
GHSA-cp4w-6x4w-v2h5
|
lambdaisland/uri `authority-regex` returns the wrong authority
|
Summary`authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to CVE-2020-8910.Detailshttps://github.com/lambdaisland/uri/blob/d3355fcd3e235238f4dcd37be97787a84e580072/src/lambdaisland/uri.cljc#L9This regex doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output.
**Payload:** `https://example.com\\@google.com`
The returned host is `google.com`, but the correct host should be `example.com`.`urllib3` (Python) and `google-closure-library` (Javascript) return `example.com` as the host. Here the correct (or current) regex used by `google-closure-library`:https://github.com/google/closure-library/blob/0e567abedb058e9b194a40cfa3ad4c507653bccf/closure/goog/uri/utils.js#L189PoCImpactThe library returns the wrong authority, and it can be abused to bypass host restrictions.ReferenceWHATWG Living URL spec, section 4.4 URL Parsing, host state: https://url.spec.whatwg.org/#url-parsing
|
[] | null | 6.5 | null | null | null |
GHSA-9cqg-8572-qvpg
|
The Echo extension for MediWiki does not properly implement the hideuser functionality, which allows remote authenticated users to see hidden usernames in "non-revision based" notifications, as demonstrated by viewing a hidden username in a Thanks notification.
|
[] | null | null | null | null | null |
|
PYSEC-2018-45
| null |
It was noticed an XSS in certain 404 pages that could be exploited to perform an XSS attack. Chrome will detect this as a reflected XSS attempt and prevent the page from loading. Firefox and other browsers don't, and are vulnerable to this attack. Mitigation: The fix for this is to upgrade to Apache Airflow 1.9.0 or above.
|
[] | null | null | null | null | null |
CVE-2025-36564
|
Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
|
[] | null | 7.8 | null | null | null |
|
GHSA-vg44-7gqv-2h5h
|
SALTO ProAccess SPACE 5.4.3.0 allows Directory Traversal in the Data Export feature.
|
[] | null | 8.6 | null | null | null |
|
GHSA-mh59-w44g-9pjr
|
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.986 via the data_fetch. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract data from password protected posts.
|
[] | null | 4.3 | null | null | null |
|
GHSA-9c2j-5jrv-c2w9
|
Double free vulnerability in the kernel in Microsoft Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2, allows local users to gain privileges via a crafted application, related to object initialization during error handling, aka "Windows Kernel Double Free Vulnerability."
|
[] | null | 7.8 | null | null | null |
|
CVE-2008-6549
|
The password_checker function in config/multiconfig.py in MoinMoin 1.6.1 uses the cracklib and python-crack features even though they are not thread-safe, which allows remote attackers to cause a denial of service (segmentation fault and crash) via unknown vectors.
|
[
"cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2018:1060
|
Red Hat Security Advisory: pcs security update
|
pcs: Privilege escalation via authorized user malicious REST call pcs: Debug parameter removal bypass, allowing information disclosure rack-protection: Timing attack in authenticity_token.rb
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.7 | null | null |
GHSA-h33j-gch2-5c9c
|
handle_daylightsaving.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, NUUO Crystal 2.2.1 through 3.2.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the NTPServer parameter.
|
[] | null | null | 9.8 | null | null |
|
CVE-2008-4544
|
Unspecified vulnerability in an unspecified Microsoft API, as used by Cisco Unity and possibly other products, allows remote attackers to cause a denial of service by sending crafted packets to dynamic UDP ports, related to a "processing error."
|
[
"cpe:2.3:a:cisco:unity:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-rphc-h572-2x9f
|
Cross-site Scripting in showdoc/showdoc
|
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround.
|
[] | null | null | 9 | null | null |
RHSA-2019:0739
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 jenkins-2-plugins security update
|
jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1292) jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1320) jenkins-plugin-script-security: sandbox bypass in script security plugin jenkins-plugin-workflow-cps: Sandbox bypass in Pipeline: Groovy Plugin (SECURITY-1336(2)) jenkins-matrix-project-plugin: sandbox bypass in matrix project plugin jenkins-job-dsl-plugin: Script security sandbox bypass in Job DSL Plugin (SECURITY-1342)
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 8.8 | null | null |
CVE-2007-4171
|
SQL injection vulnerability in komentar.php in the Forum Module for auraCMS (Modul Forum Sederhana) allows remote attackers to execute arbitrary SQL commands via the id parameter to the default URI. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:auracms:modul_forum_sederhana:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-9j9h-cpgc-8356
|
phpMyAdmin vulnerable to Cross-site Scripting
|
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.4.x before 3.4.8 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted database name, related to the Database Synchronize panel; (2) a crafted database name, related to the Database rename panel; (3) a crafted SQL query, related to the table overview panel; (4) a crafted SQL query, related to the view creation dialog; (5) a crafted column type, related to the table search dialog; or (6) a crafted column type, related to the create index dialog.
|
[] | 2.6 | null | null | null | null |
CVE-2025-1844
|
ESAFENET CDG backupLogDetail.jsp sql injection
|
A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Affected is an unknown function of the file /CDGServer3/logManagement/backupLogDetail.jsp. The manipulation of the argument logTaskId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-f5gc-p5m3-v347
|
XXE in petl
|
ImpactInformation DisclosureSummary[petl](https://github.com/petl-developers/petl) is a Python library that provides functions for extraction, transformation, and loading (ETL) of data.petl before 1.68, in some configurations, allows resolution of entities in XML input.An attacker who is able to submit XML input to an application using petl can disclose arbitrary files on the file system in the context of the user under which the application is running.Affected ApplicationsApplications that:accept attacker-supplied XML input that is processed using petl < 1.68return the response generated by petl back to the attackerconfigure lxml as the underlying XML processing library used by petlhave read privileges in filesystem files with sensitive informationMitigationUpdate to petl >= 1.68WorkaroundsAssure there is no user/external access to the application using [petl](https://github.com/petl-developers/petl)Assure your application is not using the function [fromxml()](https://petl.readthedocs.io/en/stable/io.html#petl.io.xml.fromxml)Referenceshttps://github.com/nvn1729/advisories/blob/master/cve-2020-29128.mdhttps://github.com/petl-developers/petl/pull/527https://github.com/petl-developers/petl/releases/tag/v1.6.8https://petl.readthedocs.io/en/stable/changes.htmlhttps://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_ProcessingFor more informationIf you have any questions or comments about this advisory:Add a comment in the Github [issue](https://github.com/petl-developers/petl/pull/527)Thaks to Naveen Sunkavally.
|
[] | 8.9 | 9.8 | null | null | null |
CVE-2022-39106
|
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-g6x6-w452-43rx
|
SQL injection vulnerability in plugin.php in the Crazy Star plugin 2.0 for Discuz! allows remote authenticated users to execute arbitrary SQL commands via the fmid parameter in a view action.
|
[] | null | null | null | null | null |
|
CVE-2011-1471
|
Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-9rpg-w3f6-9mpm
|
Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.
|
[] | null | 8.1 | null | null | null |
|
GHSA-3pfw-5mj7-cxfg
|
The WebSockets implementation in Mozilla Firefox 4 through 4.0 Beta 7 does not properly perform proxy upgrade negotiation, which has unspecified impact and remote attack vectors, related to an "inherent problem" with the WebSocket specification.
|
[] | null | null | null | null | null |
|
GHSA-27fg-vf5m-qmjj
|
In the Linux kernel, the following vulnerability has been resolved:vfio/pci: fix potential memory leak in vfio_intx_enable()If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2025:12521
|
Red Hat Security Advisory: sqlite security update
|
sqlite: Integer Truncation in SQLite
|
[
"cpe:/a:redhat:rhel_e4s:8.8::appstream",
"cpe:/a:redhat:rhel_tus:8.8::appstream",
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos"
] | null | 7.7 | null | null | null |
GHSA-43f4-4889-775c
|
DrayTek routers before 2018-05-23 allow CSRF attacks to change DNS or DHCP settings, a related issue to CVE-2017-11649.
|
[] | null | null | 6.5 | null | null |
|
GHSA-7qch-65fq-c3xh
|
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix potencial out-of-bounds when buffer offset is invalidI found potencial out-of-bounds when buffer offset fields of a few requests
is invalid. This patch set the minimum value of buffer offset field to
->Buffer offset to validate buffer length.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2024:4621
|
Red Hat Security Advisory: qt5-qtbase security update
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.