id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-h3v9-46pp-h33w | Cross-site Scripting in Jenkins Multiselect parameter Plugin | Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | []
| null | 8 | null | null |
CVE-2010-1575 | The Cisco Content Services Switch (CSS) 11500 with software 08.20.1.01 conveys authentication data through ClientCert-* headers but does not delete client-supplied ClientCert-* headers, which might allow remote attackers to bypass authentication via crafted header data, as demonstrated by a ClientCert-Subject-CN header, aka Bug ID CSCsz04690. | [
"cpe:2.3:h:cisco:content_services_switch_11500:08.20.1.01:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2018-1000538 | Minio Inc. Minio S3 server version prior to RELEASE.2018-05-16T23-35-33Z contains a Allocation of Memory Without Limits or Throttling (similar to CWE-774) vulnerability in write-to-RAM that can result in Denial of Service. This attack appear to be exploitable via Sending V4-(pre)signed requests with large bodies . This vulnerability appears to have been fixed in after commit 9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7. | [
"cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2022-49553 | fs/ntfs3: validate BOOT sectors_per_clusters | In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: validate BOOT sectors_per_clusters
When the NTFS BOOT sectors_per_clusters field is > 0x80, it represents a
shift value. Make sure that the shift value is not too large before using
it (NTFS max cluster size is 2MB). Return -EVINVAL if it too large.
This prevents negative shift values and shift values that are larger than
the field size.
Prevents this UBSAN error:
UBSAN: shift-out-of-bounds in ../fs/ntfs3/super.c:673:16
shift exponent -192 is negative | []
| null | null | null | null |
CVE-2017-13201 | An information disclosure vulnerability in the Android media framework (mediadrm). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63982768. | [
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-mp89-6v8w-j8gv | Buffer overflow in the log2vis_utf8 function in pyfribidi.c in GNU FriBidi 0.19.1, 0.19.2, and possibly other versions, as used in PyFriBidi 0.10.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Arabic UTF-8 string that causes original 2-byte UTF-8 sequences to be transformed into 3-byte sequences. | []
| null | null | null | null |
|
CVE-2023-43072 |
Dell SmartFabric Storage Software v1.4 (and earlier) contains an improper access control vulnerability in the CLI. A local possibly unauthenticated attacker could potentially exploit this vulnerability, leading to ability to execute arbritrary shell commands.
| [
"cpe:2.3:a:dell:smartfabric_storage_software:*:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
GHSA-r2vj-9427-ph5q | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StorePlugin ShopElement allows Stored XSS.This issue affects ShopElement: from n/a through 2.0.0. | []
| null | 6.5 | null | null |
|
CVE-2020-26565 | ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data. | [
"cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
RHSA-2002:151 | Red Hat Security Advisory: : Updated libpng packages fix buffer overflow | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
]
| null | null | null | null |
GHSA-qv57-784w-q593 | The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | []
| null | 6 | null | null |
|
GHSA-pf8r-282h-75wr | Certain HP DesignJet products may be vulnerable to unauthenticated HTTP requests which allow viewing and downloading of print job previews. | []
| null | null | null | null |
|
CVE-2025-6339 | ponaravindb Hospital Management System func3.php sql injection | A vulnerability was found in ponaravindb Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /func3.php. The manipulation of the argument username1 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-wcxv-ff2g-c9qw | Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet. | []
| null | null | 9.8 | null |
|
CVE-2023-47655 | WordPress ANAC XML Bandi di Gara Plugin <= 7.5 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi ANAC XML Bandi di Gara.This issue affects ANAC XML Bandi di Gara: from n/a through 7.5.
| [
"cpe:2.3:a:wpgov:anac_xml_bandi_di_gara:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
GHSA-c3p8-236j-8hvq | The Loopback Filesystem (LOFS) in Sun Solaris 10 allows local users in a non-global zone to move and rename files in a read-only filesystem, which could lead to a denial of service. | []
| null | null | null | null |
|
CVE-2012-4742 | The web_node_register function in web.pm in PacketFence before 3.0.2 might allow remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:packetfence:packetfence:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-39xf-jpcr-gmh4 | A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiEDR versions 5.0.2, 5.0.1, 5.0.0, 4.0.0 may allow an unauthenticated attacker on the network to disguise as and forge messages from other collectors. | []
| null | 9.1 | null | null |
|
RHSA-2011:0346 | Red Hat Security Advisory: openldap security and bug fix update | openldap: forwarded bind failure messages cause success | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-rjwp-c3f6-mgx5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wphrmanager WP-HR Manager: The Human Resources Plugin for WordPress allows Reflected XSS. This issue affects WP-HR Manager: The Human Resources Plugin for WordPress: from n/a through 3.1.0. | []
| null | 7.1 | null | null |
|
GHSA-77qx-5cmh-26mv | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). | []
| null | 4.8 | null | null |
|
CVE-2008-6331 | Multiple cross-site request forgery (CSRF) vulnerabilities in Streber before 0.08093 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:streber-pm:streber:*:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.08:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.054:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.055:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.056:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.078:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.079:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0791:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0792:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0794:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0795:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0796:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.0801:*:*:*:*:*:*:*",
"cpe:2.3:a:streber-pm:streber:0.07991:*:*:*:*:*:*:*"
]
| null | null | null | 6 |
|
GHSA-hj32-h42w-92qh | An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. | []
| null | 3.1 | null | null |
|
RHSA-2020:1940 | Red Hat Security Advisory: OpenShift Container Platform 4.4.3 ose-cluster-policy-controller-container security update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.4::el7"
]
| null | 7.5 | null | null |
CVE-2014-4541 | Cross-site scripting (XSS) vulnerability in shortcode-generator/preview-shortcode-external.php in the OMFG Mobile Pro plugin 1.1.26 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter. | [
"cpe:2.3:a:omfg_mobile_project:omfg_mobile:*:-:-:*:-:wordpress:*:*"
]
| null | null | null | 4.3 |
|
cisco-sa-FND-UPWD-dCRPuQ78 | Cisco IoT Field Network Director Improper Domain Access Control Vulnerability | A vulnerability in the user management functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to manage user information for users in different domains on an affected system.
The vulnerability is due to improper domain access control. An attacker could exploit this vulnerability by manipulating JSON payloads to target different domains on an affected system. A successful exploit could allow the attacker to manage user information for users in different domains on an affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | null | 4.1 | null |
CVE-2024-44293 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. A user may be able to view sensitive user information. | [
"cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2007-4736 | SQL injection vulnerability in category.php in CartKeeper CKGold Shopping Cart 2.0 allows remote attackers to execute arbitrary SQL commands via the category_id parameter. | [
"cpe:2.3:a:cartkeeper:ckgold_shopping_cart:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-20178 | A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges. | [
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:secure_client:*:*:*:*:*:windows:*:*"
]
| null | 7.8 | null | null |
|
CVE-2004-1332 | Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request. | [
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11i:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-g9g5-cwc3-q848 | kgb-bot 1.33-2 allows remote attackers to cause a denial of service (crash). | []
| null | null | 7.5 | null |
|
CVE-2015-1563 | The ARM GIC distributor virtualization in Xen 4.4.x and 4.5.x allows local guests to cause a denial of service by causing a large number messages to be logged. | [
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
RHSA-2022:8853 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django20) security update | django: Possible XSS via '{% debug %}' template tag django: Denial-of-service possibility in file uploads | [
"cpe:/a:redhat:openstack:16.2::el8"
]
| null | 7.5 | null | null |
GHSA-w83v-wch9-fjvr | fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7. | []
| null | 7.5 | null | null |
|
GHSA-6xm8-h4fw-jrr6 | Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x before 7.0.2 CCH, and 8.0.x before 8.0.1 allows remote attackers to execute arbitrary code via a crafted attachment in an e-mail message sent over SMTP, a variant of CVE-2007-6706. | []
| null | null | null | null |
|
CVE-2014-8386 | Multiple stack-based buffer overflows in Advantech AdamView 4.3 and earlier allow remote attackers to execute arbitrary code via a crafted (1) display properties or (2) conditional bitmap parameter in a GNI file. | [
"cpe:2.3:a:advantech:adamview:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-42392 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18661. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
]
| null | null | 3.3 | null |
|
GHSA-5765-9mm7-gg46 | IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 264938. | []
| null | 6.3 | null | null |
|
GHSA-77rh-r8h5-mfmc | The firmware of InHand Networks InRouter302 V3.5.45 introduces fixes for TALOS-2022-1472 and TALOS-2022-1474. The fixes are incomplete. An attacker can still perform, respectively, a privilege escalation and an information disclosure vulnerability. | []
| null | 9.8 | null | null |
|
GHSA-5hmp-jq2q-gjh8 | An issue in Dut Computer Control Engineering Co.'s PLC MAC1100 allows attackers to cause persistent denial of service (DOS) via a crafted packet. | []
| null | null | null | null |
|
GHSA-9rm2-rpm8-w4xg | Multiple cross-site scripting (XSS) vulnerabilities in show.php in GL-SH Deaf Forum 6.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) search, (2) page, and (3) action parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2010-4642 | Cross-site scripting (XSS) vulnerability in XWiki Enterprise before 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:0.9.543:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:0.9.790:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:0.9.793:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:0.9.840:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:0.9.1252:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:1.1:rc1:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-h4q8-96p6-jcgr | ghinstallation returns app JWT in error responses | ImpactIn ghinstallation v1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging.https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum).PatchesThis has already been patched in d24f14f8be70d94129d76026e8b0f4f9170c8c3e, and is available in releases >= v2.0.0.References_Are there any links users can visit to find out more?_See https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation for the App installation flow.For more informationIf you have any questions or comments about this advisory:Open an issue in [ghinstallation](https://github.com/bradleyfalzon/ghinstallation) | []
| null | 5 | null | null |
GHSA-jp4g-93c7-f645 | Microsoft Teams Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
GHSA-g2w3-6c6j-74qw | SAP NetWeaver AS Java allows an unauthenticated attacker to brute force the login functionality in order to identify the legitimate user IDs. This has an impact on confidentiality but not on integrity or availability. | []
| null | 5.3 | null | null |
|
GHSA-rwgm-f83r-v3qj | Improper Certificate Validation in WP-CLI framework | ImpactAn improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself.PatchesThe vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request.The default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\Utils\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\Utils\http_request()`, including those in separate WP-CLI bundled or third-party packages.https://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change.Subsequent PRs on the command repositories have added an `--insecure` flag to the appropriate commands on the following repositories to counter the breaking change:https://github.com/wp-cli/config-command/pull/128https://github.com/wp-cli/core-command/pull/186https://github.com/wp-cli/extension-command/pull/287https://github.com/wp-cli/checksum-command/pull/86https://github.com/wp-cli/package-command/pull/138WorkaroundsThere is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0.The workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior.References[CWE: Improper Certificate Validation](https://cwe.mitre.org/data/definitions/295.html)For more informationIf you have any questions or comments about this advisory:Join the `#cli` channel in the [WordPress.org Slack](https://make.wordpress.org/chat/) to ask questions or provide feedback. | []
| null | 9.1 | null | null |
GHSA-6p6g-2h65-337p | The function DCTStream::getBlock in Stream.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted pdf file, as demonstrated by pdftoppm. | []
| null | null | 5.5 | null |
|
GHSA-cwg9-p6fm-4cj6 | Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), uses world-writable permissions for product-installation files, which allows local users to gain privileges by modifying a file. | []
| null | null | null | null |
|
CVE-2004-0068 | PHP remote file inclusion vulnerability in config.php for PhpDig 1.6.5 and earlier allows remote attackers to execute arbitrary PHP code by modifying the $relative_script_path parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:phpdig.net:phpdig:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-vw23-4pvr-fm3x | SQL injection vulnerability in the Help Desk application in Wave EMBASSY Remote Administration Server (ERAS) allows remote authenticated users to execute arbitrary SQL commands via the ct100$4MainController$TextBoxSearchValue parameter (aka the search field), leading to execution of operating-system commands. | []
| null | null | null | null |
|
GHSA-6pw3-c62c-m9jg | Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.16 and 5.x before 5.0.7 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to shared files. | []
| null | null | null | null |
|
GHSA-f8jv-g4f8-mp52 | CWE-312: Cleartext Storage of Sensitive Information vulnerability exists that exposes test
credentials in the firmware binary | []
| null | 8.5 | null | null |
|
GHSA-c6g4-v26w-7hqg | IBM Security Guardium Big Data Intelligence (SonarG) 3.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 137778. | []
| null | null | 7.8 | null |
|
GHSA-f4q7-86mf-q9v2 | WebAccess/NMS (versions prior to 3.0.2) does not sanitize XML input. Specially crafted XML input could allow an attacker to read sensitive files. | []
| null | null | null | null |
|
GHSA-xm2g-jw84-7vcv | Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | null | null | null |
|
CVE-2023-52995 | riscv/kprobe: Fix instruction simulation of JALR | In the Linux kernel, the following vulnerability has been resolved:
riscv/kprobe: Fix instruction simulation of JALR
Set kprobe at 'jalr 1140(ra)' of vfs_write results in the following
crash:
[ 32.092235] Unable to handle kernel access to user memory without uaccess routines at virtual address 00aaaaaad77b1170
[ 32.093115] Oops [#1]
[ 32.093251] Modules linked in:
[ 32.093626] CPU: 0 PID: 135 Comm: ftracetest Not tainted 6.2.0-rc2-00013-gb0aa5e5df0cb-dirty #16
[ 32.093985] Hardware name: riscv-virtio,qemu (DT)
[ 32.094280] epc : ksys_read+0x88/0xd6
[ 32.094855] ra : ksys_read+0xc0/0xd6
[ 32.095016] epc : ffffffff801cda80 ra : ffffffff801cdab8 sp : ff20000000d7bdc0
[ 32.095227] gp : ffffffff80f14000 tp : ff60000080f9cb40 t0 : ffffffff80f13e80
[ 32.095500] t1 : ffffffff8000c29c t2 : ffffffff800dbc54 s0 : ff20000000d7be60
[ 32.095716] s1 : 0000000000000000 a0 : ffffffff805a64ae a1 : ffffffff80a83708
[ 32.095921] a2 : ffffffff80f160a0 a3 : 0000000000000000 a4 : f229b0afdb165300
[ 32.096171] a5 : f229b0afdb165300 a6 : ffffffff80eeebd0 a7 : 00000000000003ff
[ 32.096411] s2 : ff6000007ff76800 s3 : fffffffffffffff7 s4 : 00aaaaaad77b1170
[ 32.096638] s5 : ffffffff80f160a0 s6 : ff6000007ff76800 s7 : 0000000000000030
[ 32.096865] s8 : 00ffffffc3d97be0 s9 : 0000000000000007 s10: 00aaaaaad77c9410
[ 32.097092] s11: 0000000000000000 t3 : ffffffff80f13e48 t4 : ffffffff8000c29c
[ 32.097317] t5 : ffffffff8000c29c t6 : ffffffff800dbc54
[ 32.097505] status: 0000000200000120 badaddr: 00aaaaaad77b1170 cause: 000000000000000d
[ 32.098011] [<ffffffff801cdb72>] ksys_write+0x6c/0xd6
[ 32.098222] [<ffffffff801cdc06>] sys_write+0x2a/0x38
[ 32.098405] [<ffffffff80003c76>] ret_from_syscall+0x0/0x2
Since the rs1 and rd might be the same one, such as 'jalr 1140(ra)',
hence it requires obtaining the target address from rs1 followed by
updating rd.
[Palmer: Pick Guo's cleanup] | []
| null | null | null | null |
PYSEC-2022-43000 | null | Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | []
| null | null | null | null |
CVE-2019-7984 | Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have an out of bound write vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2006-2056 | Argument injection vulnerability in Internet Explorer 6 for Windows XP SP2 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API. | [
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-x98h-w84g-36cp | SQL injection vulnerability in view_profile.php in AJDating 1.0 allows remote attackers to execute arbitrary SQL commands via the user_id parameter. | []
| null | null | null | null |
|
RHSA-2010:0258 | Red Hat Security Advisory: pam_krb5 security and bug fix update | pam_krb5: Password prompt varies for existent and non-existent users | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-4xwg-h49w-4q68 | Multiple Read overflows issue due to improper length check while decoding dedicated_eps_bearer_req/ act_def_context_req/ cs_serv_notification/ emm_info/ guti_realloc_cmd in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 | []
| null | null | null | null |
|
RHSA-2023:0293 | Red Hat Security Advisory: sudo security update | sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
]
| null | 7.8 | null | null |
GHSA-8jvw-57g3-p386 | LimeSurvey 1.90+ build9642-20101214 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by admin/statistics.php and certain other files. | []
| null | null | null | null |
|
CVE-2022-30799 | Online Ordering System v1.0 by oretnom23 has SQL injection via store/orderpage.php. | [
"cpe:2.3:a:online_ordering_system_project:online_ordering_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
GHSA-phgr-v47c-g54w | Multiple unspecified vulnerabilities in the (1) publishing component, (2) Contact Component, (3) TinyMCE Compressor, and (4) other components in Joomla! 1.0.5 and earlier have unknown impact and attack vectors. | []
| null | null | null | null |
|
GHSA-w73v-gw8h-8683 | Internet Explorer 6.x on Windows XP SP2 allows remote attackers to execute arbitrary code, as demonstrated using a document with a draggable file type such as .xml, .doc, .py, .cdf, .css, .pdf, or .ppt, and using ADODB.Connection and ADODB.recordset to write to a .hta file that is interpreted in the Local Zone by HTML Help. | []
| null | null | null | null |
|
GHSA-2xq6-x392-9pf3 | Missing Authorization vulnerability in Etoile Web Design Order Tracking allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Order Tracking: from n/a through 3.3.12. | []
| null | 4.3 | null | null |
|
CVE-2005-4160 | Directory traversal vulnerability in getdox.php in Torrential 1.2 allows remote attackers to read arbitrary files via "../" sequences in the query string argument. | [
"cpe:2.3:a:torrential:torrential:1.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2022-44136 | Zenario CMS 9.3.57186 is vulnerable to Remote Code Excution (RCE). | [
"cpe:2.3:a:tribalsystems:zenario:9.3.57186:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2020-2658 | Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Others). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:isupport:*:*:*:*:*:*:*:*"
]
| null | null | 8.2 | null |
|
GHSA-4v7c-4xff-r4v7 | A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened. | []
| null | null | 8.8 | null |
|
CVE-2022-3942 | SourceCodester Sanitization Management System cross site scripting | A vulnerability was found in SourceCodester Sanitization Management System and classified as problematic. This issue affects some unknown processing of the file php-sms/?p=request_quote. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-213449 was assigned to this vulnerability. | [
"cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-qxwq-j6rc-mmpc | andrzuk/FineCMS through 2017-05-28 is vulnerable to a reflected XSS in the sitename parameter to admin.php. | []
| null | null | 6.1 | null |
|
GHSA-c846-2c33-mpmm | The WordPress/Plugin Upgrade Time Out Plugin WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | []
| null | 6.3 | null | null |
|
GHSA-cf25-5rjj-26cw | Microsoft Excel 2016 Click-to-Run (C2R) allows an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11882. | []
| null | null | 7.8 | null |
|
GHSA-3h52-269p-cp9r | Information exposure in Next.js dev server due to lack of origin verification | SummaryA low-severity vulnerability in **Next.js** has been fixed in **version 15.2.2**. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while `npm run dev` is active.Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure `allowedDevOrigins` in your next config after upgrading to a patched version. [Learn more](https://nextjs.org/docs/app/api-reference/config/next-config-js/allowedDevOrigins).Learn more: https://vercel.com/changelog/cve-2025-48068CreditThanks to [sapphi-red](https://github.com/sapphi-red) and [Radman Siddiki](https://github.com/R4356th) for responsibly disclosing this issue. | []
| 2.3 | null | null | null |
CVE-2022-49653 | i2c: piix4: Fix a memory leak in the EFCH MMIO support | In the Linux kernel, the following vulnerability has been resolved:
i2c: piix4: Fix a memory leak in the EFCH MMIO support
The recently added support for EFCH MMIO regions introduced a memory
leak in that code path. The leak is caused by the fact that
release_resource() merely removes the resource from the tree but does
not free its memory. We need to call release_mem_region() instead,
which does free the memory. As a nice side effect, this brings back
some symmetry between the legacy and MMIO paths. | []
| null | 5.5 | null | null |
CVE-2024-38315 | IBM Aspera Shares session fixation | IBM Aspera Shares 1.0 through 1.10.0 PL3 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system. | [
"cpe:2.3:a:ibm:aspera_shares:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
CVE-2018-18636 | XSS exists in cgi-bin/webcm on D-link DSL-2640T routers via the var:RelaodHref or var:conid parameter. | [
"cpe:2.3:o:d-link:dsl-2640t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-2640t:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-mc7w-6r9h-c93j | TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an unauthenticated stack overflow via the "main" function. | []
| null | 9.8 | null | null |
|
GHSA-gv6j-2v3m-7374 | StarTrinity Softswitch version 2023-02-16 - Multiple Reflected XSS (CWE-79) | []
| null | 8.8 | null | null |
|
GHSA-wxv3-8897-8hq4 | 389 Directory Server 1.2.7.5, when built with mozldap, allows remote attackers to cause a denial of service (replica crash) by sending an empty modify request. | []
| null | null | 5.9 | null |
|
CVE-2012-4485 | Multiple cross-site scripting (XSS) vulnerabilities in the galleryformatter_field_formatter_view functiuon in galleryformatter.tpl.php the Gallery formatter module before 7.x-1.2 for Drupal allow remote authenticated users with permissions to create a node or entity to inject arbitrary web script or HTML via the (1) title or (2) alt parameter. | [
"cpe:2.3:a:manuel_garcia:galleryformatter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:6.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:6.x-1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:6.x-1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:6.x-1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:manuel_garcia:galleryformatter:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-x3cc-x39p-42qx | fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name | ImpactAs a part of this vulnerability, user was able to se code using `__proto__` as a tag or attribute name.PatchesThe problem has been patched in v4.1.2WorkaroundsUser can check for "__proto__" in the XML string before parsing it to the parser.Referenceshttps://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7 | []
| null | 6.5 | null | null |
GHSA-g2xw-jrgp-4j4f | MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ("quadratic blowup" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942. | []
| null | null | null | null |
|
CVE-2019-17418 | An issue was discovered in MetInfo 7.0. There is SQL injection via the admin/?n=language&c=language_general&a=doSearchParameter appno parameter, a different issue than CVE-2019-16997. | [
"cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
GHSA-m2p9-47r7-gwcw | Multiple cross-site scripting (XSS) vulnerabilities in pd-admin before 4.17 allow remote authenticated users to inject arbitrary web script or HTML via (1) the WebFTP Overview "Create new directory" field or (2) the body of an e-mail autoresponder message. | []
| null | null | null | null |
|
RHSA-2022:8845 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-paramiko) security update | python-paramiko: Race condition in the write_private_key_file function | [
"cpe:/a:redhat:openstack:16.2::el8"
]
| null | 5.1 | null | null |
ICSA-22-349-09 | Siemens Products affected by OpenSSL 3.0 | A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). | []
| null | 7.5 | null | null |
GHSA-4r4m-hjwj-43p8 | Insecure Defaults Allow MITM Over TLS in engine.io-client | Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks.The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled.RecommendationUpdate to version 1.6.9 or later.If you are unable to upgrade, ensure all calls to socket.io to have a `rejectedUnauthorized: true` flag. | []
| null | null | 5.9 | null |
GHSA-568v-wj37-w729 | A Missing Authentication vulnerability in RobotWare for the OmniCore robot controller allows an attacker to read and modify files on the robot controller if the attacker has access to the Connected Services Gateway Ethernet port. | []
| null | null | null | null |
|
GHSA-qc6f-gvhw-rjrj | Microsoft Defender for Endpoint on Android Spoofing Vulnerability | []
| null | 8.1 | null | null |
|
GHSA-qjrv-v6qp-x99x | SurrealDB has an Uncaught Exception Handling Parsing Errors on Empty Strings | The error rendering code from the parser would panic when handling failed parsing of queries where the error occurred when converting an empty string to a SurrealDB value. This would be the case when casting an empty string to a `record`, `duration` or `datetime`, as well as potentially when parsing an empty string to JSON or providing an empty string to the `type::field` and `type::fields` functions.ImpactA client that is authorized to run queries in a SurrealDB server would be able to execute a malformed query which would fail to parse when converting an empty string and cause a panic in the error rendering code. This would crash the server, leading to denial of service.PatchesVersion 2.0.4 and later are not affected by this issue.WorkaroundsAffected users who are unable to update may want to limit the ability of untrusted clients to run arbitrary SurrealQL queries in the affected versions of SurrealDB. To limit the impact of the denial of service, SurrealDB administrators may also want to ensure that the SurrealDB process is running so that it can be automatically re-started after a crash. | []
| 7.1 | 6.5 | null | null |
CVE-2023-43067 |
Dell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system.
| [
"cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
GHSA-46x4-34f2-j42g | A CSV injection in the codepress-admin-columns (aka Admin Columns) plugin 3.4.6 for WordPress allows malicious users to gain remote control of other computers. By choosing formula code as his first or last name, an attacker can create a user with a name that contains malicious code. Other users might download this data as a CSV file and corrupt their PC by opening it in a tool such as Microsoft Excel. The attacker could gain remote access to the user's PC. | []
| null | 8.8 | null | null |
|
GHSA-8w5w-hcg8-56w5 | dnsmasq 2.43 allows remote attackers to cause a denial of service (daemon crash) by (1) sending a DHCPINFORM while lacking a DHCP lease, or (2) attempting to renew a nonexistent DHCP lease for an invalid subnet as an "unknown client," a different vulnerability than CVE-2008-3214. | []
| null | null | null | null |
|
CVE-2021-44864 | TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable to Buffer Overflow. Authenticated attackers can crash router httpd services via /userRpm/PingIframeRpm.htm request which contains redundant & in parameter. | [
"cpe:2.3:o:tp-link:wn886n_firmware:1.0.1:build_150127_rel.34123n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wn886n:3.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
CVE-2012-4516 | librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service. | [
"cpe:2.3:a:openfabrics:librdmacm:1.0.16:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-r8gp-2wqm-9j2h | Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.