id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2017:0001 | Red Hat Security Advisory: ipa security update | ipa: DoS attack against kerberized services by abusing password policy ipa: Insufficient permission check in certprofile-mod | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.3 | null |
GHSA-74vq-h4q8-x6jv | Ansible Path Traversal vulnerability | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. | []
| 2.4 | 4.2 | null | null |
CVE-1999-0115 | AIX bugfiler program allows local users to gain root access. | [
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
GHSA-rgm2-hxqf-7hh2 | A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | []
| null | null | null | null |
|
GHSA-462w-v97r-4m45 | Jinja2 sandbox escape via string formatting | In Pallets Jinja before 2.10.1, `str.format_map` allows a sandbox escape.The sandbox is used to restrict what code can be evaluated when rendering untrusted, user-provided templates. Due to the way string formatting works in Python, the `str.format_map` method could be used to escape the sandbox.This issue was previously addressed for the `str.format` method in Jinja 2.8.1, which discusses the issue in detail. However, the less-common `str.format_map` method was overlooked. This release applies the same sandboxing to both methods.If you cannot upgrade Jinja, you can override the `is_safe_attribute` method on the sandbox and explicitly disallow the `format_map` method on string objects. | []
| 7.7 | null | 8.6 | null |
GHSA-5c64-xrqv-mv4g | Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | null | null |
|
GHSA-8h26-hc89-g7w7 | A vulnerability has been found in xmedcon 0.25.0 and classified as problematic. Affected by this vulnerability is the function malloc of the component DICOM File Handler. The manipulation leads to integer underflow. The attack can be launched remotely. Upgrading to version 0.25.1 is able to address this issue. It is recommended to upgrade the affected component. | []
| 5.3 | 4.3 | null | null |
|
GHSA-vh7q-j8p5-2h4h | silverstripe/framework sends passwords back to browsers under some circumstances | Under some circumstances a form may populate a PasswordField with submitted data, reflecting submitted data back to a user. The user will only see their own submissions for password data, which is not considered best practice. We are not aware of data leaks to other users, devices or sessions. | []
| null | 3.5 | null | null |
GHSA-55gv-hfg3-hwjq | Magento Defense-in-depth security mitigation vulnerability | Magento versions 2.3.4 and earlier, 2.2.11 and earlier (see note), 1.14.4.4 and earlier, and 1.9.4.4 and earlier have a defense-in-depth security mitigation vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | 9.8 | null | null |
GHSA-pvp4-8qcq-8g5f | Cross-Site Request Forgery (CSRF) vulnerability in mmrs151 Daily Prayer Time plugin <= 2023.03.08 versions. | []
| null | 5.4 | null | null |
|
GHSA-6wfg-97vq-vxmg | In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | []
| null | 7.8 | null | null |
|
GHSA-cxv2-g9cc-jg8q | A vulnerability was found in Overdrive Eletrônica course-builder up to 1.7.x and classified as problematic. Affected by this issue is some unknown functionality of the file coursebuilder/modules/oeditor/oeditor.html. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is e39645fd714adb7e549908780235911ae282b21b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218372. | []
| null | 6.1 | null | null |
|
GHSA-pqmv-mqwc-wmr3 | In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed. | []
| null | 6.5 | null | null |
|
GHSA-2hf9-vh2r-j6vp | Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) .phtml extension. | []
| null | null | null | null |
|
GHSA-hmf7-f8gf-8f4p | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | []
| null | 6.5 | null | null |
|
GHSA-rfc9-vxpm-6mm9 | In the Linux kernel, the following vulnerability has been resolved:platform/x86: ideapad-laptop: fix a NULL pointer dereferenceThe third parameter of dytc_cql_command should not be NULL since it will
be dereferenced immediately. | []
| null | 5.5 | null | null |
|
GHSA-7687-8cj4-w742 | Microsoft Internet Explorer 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | []
| null | null | null | null |
|
GHSA-mq47-xg5g-jxq9 | A vulnerability in the Session Initiation Protocol (SIP) on the Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the targeted appliance. The vulnerability is due to excessive SIP traffic sent to the device. An attacker could exploit this vulnerability by transmitting large volumes of SIP traffic to the VCS. An exploit could allow the attacker to cause a complete DoS condition on the targeted system. Cisco Bug IDs: CSCve32897. | []
| null | null | 6.8 | null |
|
GHSA-wjhv-8fw8-jxw2 | The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem. | []
| null | null | null | null |
|
CVE-2018-11439 | The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file. | [
"cpe:2.3:a:taglib:taglib:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-hm46-wqvg-9pp2 | In modem, there is a possible missing verification of HashMME value in Security Mode Command. This could local denial of service with no additional execution privileges. | []
| null | 5.5 | null | null |
|
GHSA-gpgq-5q34-mh72 | A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service. | []
| null | 7.5 | null | null |
|
GHSA-xh3w-9cjp-3cf8 | The Data Services Management Console does not sufficiently encode user-controlled inputs, allowing an attacker to inject malicious script. When a targeted victim, who is already logged in, clicks on the compromised link, the injected script gets executed within the scope of victim�s browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted. | []
| null | 4.4 | null | null |
|
GHSA-8cvf-5jgg-fw72 | Stack-based buffer overflow in the MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan before 9.0.718.1 allows remote attackers to execute arbitrary code via a long command. | []
| null | null | null | null |
|
CVE-2022-34184 | Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:crx_content_package_deployer:*:*:*:*:*:jenkins:*:*"
]
| null | 5.4 | null | 3.5 |
|
RHSA-2018:1213 | Red Hat Security Advisory: python-paramiko security update | python-paramiko: Authentication bypass in transport.py | [
"cpe:/a:redhat:ansible_engine:2.4::el7"
]
| null | null | 9.8 | null |
CVE-2023-48355 | In jpg driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
GHSA-mp9m-qwjx-vrh9 | WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, accesses uninitialized memory during processing of editable elements, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site. | []
| null | null | null | null |
|
GHSA-75c5-xw7c-p5pm | PyJWT Issuer field partial matches allowed | SummaryThe wrong string if check is run for `iss` checking, resulting in `"acb"` being accepted for `"_abc_"`.DetailsThis is a bug introduced in version [2.10.0](https://github.com/jpadilla/pyjwt/commit/1570e708672aa9036bc772476beae8bfa48f4131#diff-6893ad4a1c5a36b8af3028db8c8bc3b62418149843fc382faf901eaab008e380R366): checking the "iss" claim
changed from `isinstance(issuer, list)` to `isinstance(issuer,
Sequence)`.Since str is a Sequnce, but not a list, `in` is also used for string
comparison. This results in `if "abc" not in "__abcd__":` being
checked instead of `if "abc" != "__abc__":`.PoCCheck out the unit tests added here: https://github.com/jpadilla/pyjwt-ghsa-75c5-xw7c-p5pmImpactI would say the real world impact is not that high, seeing as the signature still has to match. We should still fix it. | []
| 2.1 | 2.2 | null | null |
CVE-2014-1466 | SQL injection vulnerability in CSP MySQL User Manager 2.3 allows remote attackers to execute arbitrary SQL commands via the login field of the login page. | [
"cpe:2.3:a:csp_mysql_user_manager_project:csp_mysql_user_manager:2.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-hxxr-j64h-hx75 | PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a crafted application. | []
| null | null | null | null |
|
GHSA-f86m-qh2c-23m2 | The Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large, out-of-range score parameter. | []
| null | null | null | null |
|
CVE-2018-10608 | SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utilization. Restart of the application is required. | [
"cpe:2.3:a:selinc:acselerator_architect:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
CVE-2017-5007 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-v8pc-pwrh-wr73 | Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 and 10.1.2.3 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2008-3977. | []
| null | null | null | null |
|
CVE-2016-5080 | Integer overflow in the rtxMemHeapAlloc function in asn1rt_a.lib in Objective Systems ASN1C for C/C++ before 7.0.2 allows context-dependent attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow), on a system running an application compiled by ASN1C, via crafted ASN.1 data. | [
"cpe:2.3:a:objective_systems:asn1c:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-w6rh-226p-qgc7 | The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | []
| null | 6.1 | null | null |
|
CVE-2018-14861 | Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. | [
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-8rmh-55h4-93h5 | DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import | ImpactItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line._This vulnerability does NOT impact 7.x._Patches_DSpace 6.x:_Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c06.x patch file: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0.patch (may be applied manually if an immediate upgrade to 6.4 or 7.x is not possible)_DSpace 5.x:_Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af01995.x patch file: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 or 7.x is not possible)Apply the patch to your DSpaceIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:Download the appropriate patch file to the machine where DSpace is runningFrom the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.Restart TomcatWorkaroundsAs a basic workaround, you may block all access to the following URL paths:If you are using the XMLUI, block all access to `/admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/xmlui", then you'd need to block access to `/xmlui/admin/batchimport`.If you are using the JSPUI, block all access to `/dspace-admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/jspui", then you'd need to block access to `/jspui/dspace-admin/batchimport`.Keep in mind, only an Administrative user or a user with command-line access to the server is able to import/upload SAF packages. Therefore, assuming those users do not blindly upload untrusted SAF packages, then it is unlikely your site could be impacted by this vulnerability.For more informationIf you have any questions or comments about this advisory:Email us at security@dspace.org | []
| null | 7.2 | null | null |
CVE-2015-3228 | Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write. | [
"cpe:2.3:a:artifex:afpl_ghostscript:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2024-28020 | A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM application
and server management. If exploited a malicious high-privileged
user could use the passwords and login information through complex routines to extend access on the server and other services. | [
"cpe:2.3:a:hitachienergy:foxman-un:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r15b:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r16b:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r15b:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r16b:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
|
GHSA-r8rm-5p22-vwg9 | Unspecified vulnerability in Hitachi Cosminexus Component Container 07-00 through 07-00-10, and 07-10 through 07-10-03, as used in uCosminexus Application Server Enterprise and Standard; uCosminexus Service Platform; uCosminexus Developer Standard and Professional; uCosminexus Service Architect; Electronic Form Workflow Standard Set, Professional Library Set, and Developer Client Set; and uCosminexus ERP Integrator, does not properly manage session information, which has an unspecified impact related to "unintended other requests." | []
| null | null | null | null |
|
GHSA-6g95-x6cj-mg4v | Django database denial-of-service with ModelMultipleChoiceField | ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries. | []
| null | 7.5 | null | null |
CVE-2020-26808 | SAP AS ABAP(DMIS), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions - 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application. | [
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_620:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_640:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_710:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2011_1_752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_as_abap\\(dmis\\):2020:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_s4_hana\\(dmis\\):101:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_s4_hana\\(dmis\\):102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_s4_hana\\(dmis\\):103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_s4_hana\\(dmis\\):104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_s4_hana\\(dmis\\):105:*:*:*:*:*:*:*"
]
| null | null | 9.1 | null |
|
CVE-2023-4325 | Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities | Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities | [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-w9wm-7vhg-5j6v | Open redirect vulnerability in /idm/user/login.jsp in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the nextPage parameter. | []
| null | null | null | null |
|
GHSA-p5r9-537g-hxph | An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31222873. References: N-CVE-2016-6775. | []
| null | null | 7.8 | null |
|
CVE-2006-5008 | Unspecified vulnerability in utape in IBM AIX 5.2.0 and 5.3.0 allows attackers to execute arbitrary commands and overwrite arbitrary files via unspecified vectors. | [
"cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2004-0741 | LionMax Software WWW File Share Pro 2.60 allows remote attackers to cause a denial of service (crash or hang) via a long URL, possibly triggering a buffer overflow. | [
"cpe:2.3:a:lionmax_software:www_file_share_pro:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lionmax_software:www_file_share_pro:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:lionmax_software:www_file_share_pro:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:lionmax_software:www_file_share_pro:2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:lionmax_software:www_file_share_pro:2.46:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-r53j-2p5j-jv2h | An attacker could have positioned a <code>datalist</code> element to obscure the address bar. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. | []
| null | 4.3 | null | null |
|
CVE-2012-1592 | A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files. | [
"cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
GHSA-74cj-rxf7-4mmq | A buffer overflow vulnerability in the AVI_ExtractSubtitle component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file. | []
| null | 7.1 | null | null |
|
GHSA-6r7v-c5hw-v8qh | FATEK Automation WinProladder Versions 3.30 and prior do not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code. | []
| null | null | null | null |
|
CVE-2020-0372 | In ActivityManager, there is a possible access to protected data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119673147 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-w54g-45p4-pg48 | An issue was discovered in Virtualmin 7.7. The Create Virtual Server functionality allows XSS attacks against anyone who accesses the Virtual Server Summary tab. | []
| null | 5.4 | null | null |
|
GHSA-x3rh-6c57-3xf4 | Cross-site scripting (XSS) vulnerability in the Collaboration Partner Access Console (CPAC) in Cisco WebEx Meeting Center allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCul36237. | []
| null | null | null | null |
|
GHSA-w2v3-p9w4-6w6c | Multiple unspecified vulnerabilities in bbs100 before 3.2 allow remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving certain v*printf and shift_StringIO functions. NOTE: some details were obtained from third party information. | []
| null | null | null | null |
|
RHSA-2008:0939 | Red Hat Security Advisory: openoffice.org security update | OpenOffice.org WMF integer overflow OpenOffice.org multiple EMF buffer overflows | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
]
| null | null | null | null |
GHSA-7c7v-g484-j4cf | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019. | []
| null | null | 7.5 | null |
GHSA-hf32-jrph-5wp2 | A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. | []
| null | 7.5 | null | null |
|
GHSA-9ffq-j2xg-26w9 | In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter. | []
| null | 4.8 | null | null |
|
GHSA-2jq2-rfq2-wr2p | An issue was discovered on LG mobile devices with Android OS 10 software. There was no write protection for the MTK protect2 partition. The LG ID is LVE-SMP-200028 (January 2021). | []
| null | null | null | null |
|
CVE-2020-14661 | Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:crm_technical_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.1.3:*:*:*:*:*:*:*"
]
| null | 4.7 | null | null |
|
GHSA-h4hx-pmcg-3856 | Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. | []
| null | null | 8.8 | null |
|
CVE-2019-16707 | Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx. | [
"cpe:2.3:a:hunspell_project:hunspell:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-5pqf-6c8x-wp4f | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Authentication Engine). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). | []
| null | 5.3 | null | null |
|
GHSA-4pf4-vf9p-vxx6 | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. | []
| null | null | null | null |
|
CVE-2023-22482 | JWT audience claim is not verified | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Versions of Argo CD starting with v1.8.2 and prior to 2.3.13, 2.4.19, 2.5.6, and 2.6.0-rc-3 are vulnerable to an improper authorization bug causing the API to accept certain invalid tokens. OIDC providers include an `aud` (audience) claim in signed tokens. The value of that claim specifies the intended audience(s) of the token (i.e. the service or services which are meant to accept the token). Argo CD _does_ validate that the token was signed by Argo CD's configured OIDC provider. But Argo CD _does not_ validate the audience claim, so it will accept tokens that are not intended for Argo CD. If Argo CD's configured OIDC provider also serves other audiences (for example, a file storage service), then Argo CD will accept a token intended for one of those other audiences. Argo CD will grant the user privileges based on the token's `groups` claim, even though those groups were not intended to be used by Argo CD. This bug also increases the impact of a stolen token. If an attacker steals a valid token for a different audience, they can use it to access Argo CD. A patch for this vulnerability has been released in versions 2.6.0-rc3, 2.5.6, 2.4.19, and 2.3.13. There are no workarounds. | [
"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:2.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:2.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:2.6.0:rc4:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
GHSA-g4h5-9rrr-q667 | A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number. | []
| null | 5.3 | null | null |
|
GHSA-3r89-8hw3-86vc | The Datalogic DXU service on (for example) DL-Axist devices does not require authentication for configuration changes or disclosure of configuration settings. | []
| null | 6.5 | null | null |
|
PYSEC-2016-37 | null | Radicale before 1.1 allows remote authenticated users to bypass owner_write and owner_only limitations via regex metacharacters in the user name, as demonstrated by ".*". | []
| null | null | null | null |
GHSA-jfr3-x5vj-74jf | XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV starting at CADImage+0x00000000000032eb." | []
| null | null | 7.8 | null |
|
GHSA-m9wh-p2wg-7j38 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6981. | []
| null | null | 9.8 | null |
|
cisco-sa-20190515-nxos-cmdinj-1783 | Cisco NX-OS Software Command Injection Vulnerability (CVE-2019-1783) | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying Linux operating system with the privilege level of root.
The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | null | 6.7 | null |
CVE-2021-21776 | An out-of-bounds write vulnerability exists in the SGI Format Buffer Size Processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:accusoft:imagegear:19.8:*:*:*:*:*:*:*"
]
| null | null | 9.8 | null |
|
GHSA-jqvj-8pwr-qcp8 | Cross-site scripting (XSS) vulnerability in the AdminUI in HPE Operations Manager 9.21.x before 9.21.130 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | 5.4 | null |
|
RHSA-2020:5586 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) | [
"cpe:/a:redhat:rhel_extras:7"
]
| null | 3.7 | null | null |
CVE-2016-9191 | The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.9 |
|
CVE-2024-47401 | DoS via Amplified GraphQL Response in Playbooks | Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 9.5.x <= 9.5.9 fail to prevent detailed error messages from being displayed in Playbooks which allows an attacker to generate a large response and cause an amplified GraphQL response which in turn could cause the application to crash by sending a specially crafted request to Playbooks. | []
| null | 4.3 | null | null |
CVE-2019-17268 | The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected. | [
"cpe:2.3:a:omniauth-weibo-oauth2_project:omniauth-weibo-oauth2:0.4.6:*:*:*:*:ruby:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2007-4457 | Directory traversal vulnerability in forumreply.php in Dalai Forum 1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the chemin parameter. | [
"cpe:2.3:a:florian_mahieu:dalai_forum:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2023-29382 | An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component. | [
"cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
RHSA-2018:2255 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
]
| null | null | 5.9 | null |
CVE-2014-7287 | The key-management component in Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allows remote attackers to trigger unintended content in outbound e-mail messages via a crafted key UID value in an inbound e-mail message, as demonstrated by the outbound Subject header. | [
"cpe:2.3:a:symantec:encryption_management_server:*:mp6:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pgp_universal_server:*:mp6:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2020-4648 | A vulnerability exsists in IBM Planning Analytics 2.0 whereby avatars in Planning Analytics Workspace could be modified by other users without authorization to do so. IBM X-Force ID: 186019. | [
"cpe:2.3:a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
GHSA-qpmq-3q56-379q | Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. | []
| null | null | 7.5 | null |
|
GHSA-g66j-xrpg-6cgc | IBM Scale Out Network Attached Storage (SONAS) 1.3 before 1.3.2.3 requires cleartext storage of LDAP credentials without recommending a less privileged LDAP account, which might allow attackers to obtain sensitive server information by leveraging root access to a client machine. | []
| null | null | null | null |
|
CVE-2025-21459 | Buffer Over-read in WLAN Host Communication | Transient DOS while parsing per STA profile in ML IE. | []
| null | 7.5 | null | null |
CVE-2023-40426 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2019-17040 | contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled. | [
"cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2007-1447 | The Tape Engine in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC procedure arguments, which result in memory corruption, a different vulnerability than CVE-2006-6076. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-9g83-6hr8-77g8 | Mail in Apple iOS before 6 does not properly implement the Data Protection feature for e-mail attachments, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. | []
| null | null | null | null |
|
CVE-2025-26304 | A memory leak has been identified in the parseSWF_EXPORTASSETS function in util/parser.c of libming v0.4.8. | []
| null | 8.2 | null | null |
|
GHSA-976r-qfjj-c24w | Command injection via Celery broker in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands. | []
| 9.3 | 9.8 | null | null |
CVE-2018-18342 | Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-qpjq-w25x-3v84 | view.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to obtain sensitive information via a phid parameter that is not an integer, which reveals the path in an error message. | []
| null | null | null | null |
|
CVE-2023-6043 | A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges. | [
"cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-j8mv-4vjx-93p6 | Progress Sitefinity 12.1 has a Weak Password Recovery Mechanism for a Forgotten Password because the HTTP Host header is mishandled. | []
| null | null | null | null |
|
GHSA-m494-44p8-mhr9 | Discuz! DiscuzX X3.4 has XSS via the view parameter to include/space/space_poll.php, as demonstrated by a mod=space do=poll request to home.php. | []
| null | null | 5.4 | null |
|
GHSA-38mq-vrqg-wrc3 | ** DISPUTED ** An issue was discovered in the com.getdropbox.Dropbox app 100.2 for iOS. The LAContext class for Biometric (TouchID) validation allows authentication bypass by overriding the LAContext return Boolean value to be "true" because the kSecAccessControlUserPresence protection mechanism is not used. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes iOS devices on which a jailbreak has occurred. | []
| null | null | 6.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.