id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-54256
|
WordPress Easy Blocks pro plugin <= 1.0.21 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Seerox Easy Blocks pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Easy Blocks pro: from n/a through 1.0.21.
|
[] | null | 7.1 | null | null | null |
RHSA-2005:069
|
Red Hat Security Advisory: perl security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
CVE-2024-29105
|
WordPress WP Popups – WordPress Popup builder plugin <= 2.1.5.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Timersys WP Popups allows Stored XSS.This issue affects WP Popups: from n/a through 2.1.5.5.
|
[] | null | 5.9 | null | null | null |
PYSEC-2022-271
| null |
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.2.
|
[] | null | null | null | null | null |
CVE-2012-1238
|
Session fixation vulnerability in SENCHA SNS before 1.0.2 allows remote attackers to hijack web sessions via unspecified vectors.
|
[
"cpe:2.3:a:icz:sencha_sns:*:*:*:*:*:*:*:*",
"cpe:2.3:a:icz:sencha_sns:1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-47565
|
scsi: mpt3sas: Fix kernel panic during drive powercycle test
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix kernel panic during drive powercycle test
While looping over shost's sdev list it is possible that one
of the drives is getting removed and its sas_target object is
freed but its sdev object remains intact.
Consequently, a kernel panic can occur while the driver is trying to access
the sas_address field of sas_target object without also checking the
sas_target object for NULL.
|
[] | null | null | null | null | null |
CVE-2019-0601
|
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory, aka 'HID Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0600.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 4.7 | 1.9 | null |
|
GHSA-3crh-x73c-cq7r
|
In the Linux kernel, the following vulnerability has been resolved:io_uring/rsrc: validate buffer count with offset for cloningsyzbot reports that it can trigger a WARN_ON() for kmalloc() attempt
that's too big:WARNING: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024
Modules linked in:
CPU: 0 UID: 0 PID: 6488 Comm: syz-executor312 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024
lr : __do_kmalloc_node mm/slub.c:-1 [inline]
lr : __kvmalloc_node_noprof+0x3b4/0x640 mm/slub.c:5012
sp : ffff80009cfd7a90
x29: ffff80009cfd7ac0 x28: ffff0000dd52a120 x27: 0000000000412dc0
x26: 0000000000000178 x25: ffff7000139faf70 x24: 0000000000000000
x23: ffff800082f4cea8 x22: 00000000ffffffff x21: 000000010cd004a8
x20: ffff0000d75816c0 x19: ffff0000dd52a000 x18: 00000000ffffffff
x17: ffff800092f39000 x16: ffff80008adbe9e4 x15: 0000000000000005
x14: 1ffff000139faf1c x13: 0000000000000000 x12: 0000000000000000
x11: ffff7000139faf21 x10: 0000000000000003 x9 : ffff80008f27b938
x8 : 0000000000000002 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 00000000ffffffff x4 : 0000000000400dc0 x3 : 0000000200000000
x2 : 000000010cd004a8 x1 : ffff80008b3ebc40 x0 : 0000000000000001
Call trace:
__kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 (P)
kvmalloc_array_node_noprof include/linux/slab.h:1065 [inline]
io_rsrc_data_alloc io_uring/rsrc.c:206 [inline]
io_clone_buffers io_uring/rsrc.c:1178 [inline]
io_register_clone_buffers+0x484/0xa14 io_uring/rsrc.c:1287
__io_uring_register io_uring/register.c:815 [inline]
__do_sys_io_uring_register io_uring/register.c:926 [inline]
__se_sys_io_uring_register io_uring/register.c:903 [inline]
__arm64_sys_io_uring_register+0x42c/0xea8 io_uring/register.c:903
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600which is due to offset + buffer_count being too large. The registration
code checks only the total count of buffers, but given that the indexing
is an array, it should also check offset + count. That can't exceed
IORING_MAX_REG_BUFFERS either, as there's no way to reach buffers beyond
that limit.There's no issue with registrering a table this large, outside of the
fact that it's pointless to register buffers that cannot be reached, and
that it can trigger this kmalloc() warning for attempting an allocation
that is too large.
|
[] | null | null | null | null | null |
|
CVE-2005-4511
|
Format string vulnerability in TN3270 Resource Gateway 1.1.0 allows local users to cause a denial of service and possibly execute arbitrary code via format string specifiers in syslog function calls.
|
[
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-c6fw-9pjp-59cm
|
A vulnerability has been identified in SIPORT MP (All versions < 3.1.4). Vulnerable versions of the device allow the creation of special accounts ("service users") with administrative privileges that could enable a remote authenticated attacker to perform actions that are not visible to other users of the system, such as granting persons access to a secured area.
|
[] | null | null | null | null | null |
|
GHSA-gr2m-j2m7-6qm7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Picture-Planet GmbH Verowa Connect allows Reflected XSS. This issue affects Verowa Connect: from n/a through 3.0.4.
|
[] | null | 7.1 | null | null | null |
|
GHSA-rhm6-355p-2674
|
Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.
|
[] | null | 8.5 | null | null | null |
|
RHSA-2022:4829
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null | null |
CVE-2006-4234
|
PHP remote file inclusion vulnerability in classes/query.class.php in dotProject 2.0.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the baseDir parameter.
|
[
"cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotproject:dotproject:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotproject:dotproject:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2010:0360
|
Red Hat Security Advisory: wireshark security update
|
Wireshark: various flaws in a) RADIUS, b) Bluetooth L2CAP, c) MIOP dissectors (DoS) Wireshark: Integer overflow in the AFS dissector Wireshark: Null-ptr dereference in the InfiniBand dissector Wireshark: NULL pointer dereference in the DCERPC over SMB packet disassembly wireshark: unsigned integer wrap vulnerability in ERF reader (VU#676492) wireshark: invalid pointer dereference in SMB/SMB2 dissectors wireshark: crash in LWRES dissector
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2008-3144
|
Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
|
[
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-36289
|
Protection mechanism failure in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:a:intel:media_software_development_kit:*:*:*:*:*:*:*:*"
] | null | 2.8 | null | null | null |
|
GHSA-r6ww-5963-7r95
|
Denial of Service via reachable assertion
|
A grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This was due to incorrect logic when handling `GOAWAY` frames.The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests.The issue was discovered by automated fuzz testing and is resolved by fixing the relevant state handling code.
|
[] | null | 7.5 | null | null | null |
GHSA-hfhj-x3c5-7mgv
|
D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter.
|
[] | null | 7.1 | null | null | null |
|
GHSA-q54v-7fv8-p57r
|
In the Linux kernel, the following vulnerability has been resolved:bnx2x: Fix multiple UBSAN array-index-out-of-boundsFix UBSAN warnings that occur when using a system with 32 physical
cpu cores or more, or when the user defines a number of Ethernet
queues greater than or equal to FP_SB_MAX_E1x using the num_queues
module parameter.Currently there is a read/write out of bounds that occurs on the array
"struct stats_query_entry query" present inside the "bnx2x_fw_stats_req"
struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h".
Looking at the definition of the "struct stats_query_entry query" array:struct stats_query_entry query[FP_SB_MAX_E1x+
BNX2X_FIRST_QUEUE_QUERY_IDX];FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and
has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3
meaning the array has a total size of 19.
Since accesses to "struct stats_query_entry query" are offset-ted by
BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet
queues should not exceed FP_SB_MAX_E1x (16). However one of these queues
is reserved for FCOE and thus the number of Ethernet queues should be set
to [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if
it is not.This is also described in a comment in the source code in
drivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition
of FP_SB_MAX_E1x. Below is the part of this explanation that it important
for this patch/*The total number of L2 queues, MSIX vectors and HW contexts (CIDs) iscontrol by the number of fast-path status blocks supported by thedevice (HW/FW). Each fast-path status block (FP-SB) aka non-defaultstatus block represents an independent interrupts context that canserve a regular L2 networking queue. However special L2 queues suchas the FCoE queue do not require a FP-SB and other components likethe CNIC may consume FP-SB reducing the number of possible L2 queuesIf the maximum number of FP-SB available is X then:a. If CNIC is supported it consumes 1 FP-SB thus the max number ofregular L2 queues is Y=X-1b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)c. If the FCoE L2 queue is supported the actual number of L2 queuesis Y+1d. The number of irqs (MSIX vectors) is either Y+1 (one extra forslow-path interrupts) or Y+2 if CNIC is supported (one additionalFP interrupt context for the CNIC).e. The number of HW context (CID count) is always X or X+1 if FCoEL2 queue is supported. The cid for the FCoE L2 queue is always X.
*/However this driver also supports NICs that use the E2 controller which can
handle more queues due to having more FP-SB represented by FP_SB_MAX_E2.
Looking at the commits when the E2 support was added, it was originally
using the E1x parameters: commit f2e0899f0f27 ("bnx2x: Add 57712 support").
Back then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver
was later updated to take full advantage of the E2 instead of having it be
limited to the capabilities of the E1x. But as far as we can tell, the
array "stats_query_entry query" was still limited to using the FP-SB
available to the E1x cards as part of an oversignt when the driver was
updated to take full advantage of the E2, and now with the driver being
aware of the greater queue size supported by E2 NICs, it causes the UBSAN
warnings seen in the stack traces below.This patch increases the size of the "stats_query_entry query" array by
replacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle
both types of NICs.Stack traces:UBSAN: array-index-out-of-bounds in
drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11
index 20 is out of range for type 'stats_query_entry [19]'
CPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic
#202405052133
Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360
---truncated---
|
[] | null | 7.8 | null | null | null |
|
GHSA-p8j9-f8ph-95mf
|
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a HL7 Sensor. When creating this sensor, the user can set the HL7 message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-30648
|
Junos OS and Junos OS Evolved: Receipt of a specifically malformed DHCP packet causes jdhcpd process to crash
|
An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS).
When a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which will lead to the unavailability of the DHCP service and thereby resulting in a sustained DoS. The DHCP process will restart automatically to recover the service.
This issue will occur when dhcp-security is enabled.
This issue affects Junos OS:
* All versions before 21.2R3-S9,
* from 21.4 before 21.4R3-S10,
* from 22.2 before 22.2R3-S6,
* from 22.4 before 22.4R3-S6,
* from 23.2 before 23.2R2-S3,
* from 23.4 before 23.4R2-S4,
* from 24.2 before 24.2R2;
Junos OS Evolved: * from 22.4 before 22.4R3-S6-EVO,
* from 23.2 before 23.2R2-S3-EVO,
* from 23.4 before 23.4R2-S4-EVO,
* from 24.2 before 24.2R2-EVO.
.
|
[] | 7.1 | 7.4 | null | null | null |
GHSA-q53g-qg59-mcmj
|
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
|
[] | null | 7.3 | null | null | null |
|
GHSA-hv2j-vg36-9f85
|
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
|
[] | null | null | null | null | null |
|
CVE-2016-9913
|
Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*"
] | null | 6.5 | null | 4.9 | null |
|
CVE-2023-27787
|
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
|
[
"cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2020-35947
|
An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. Nearly all of the AJAX action endpoints lacked permission checks, allowing these actions to be executed by anyone authenticated on the site. This happened because nonces were used as a means of authorization, but a nonce was present in a publicly viewable page. The greatest impact was the pagelayer_save_content function that allowed pages to be modified and allowed XSS to occur.
|
[
"cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*"
] | null | 7.4 | null | null | null |
|
CVE-2017-15959
|
Adult Script Pro 2.2.4 allows SQL Injection via the PATH_INFO to a /download URI, a different vulnerability than CVE-2007-6576.
|
[
"cpe:2.3:a:adultscriptpro:adultscriptpro:2.2.4:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2007-4703
|
The Application Firewall in Apple Mac OS X 10.5 does not prevent a root process from accepting incoming connections, even when "Block incoming connections" has been set for its associated executable, which might allow remote attackers or local root processes to bypass intended access restrictions.
|
[
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-h2g8-2825-prfr
|
NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The directory of the device is listed openly without authentication.
|
[] | null | null | 7.5 | null | null |
|
CVE-2015-5493
|
The Entityform Block module 7.x-1.x before 7.x-1.3 for Drupal does not properly check permissions when a form is locked to a role, which allows remote attackers to obtain access to certain entityforms via unspecified vectors.
|
[
"cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.x-dev:*:*:*:*:drupal:*:*"
] | null | null | null | 5 | null |
|
GHSA-54qq-9chj-rxhv
|
Cross-site Scripting in LiveHelperChat
|
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
|
[] | null | 5.4 | null | null | null |
GHSA-jhp8-52c5-gjpr
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Scott Eazy Under Construction allows Reflected XSS. This issue affects Eazy Under Construction: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-248g-g9j5-m344
|
An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31695439. References: QC-CR#1086123, QC-CR#1100695.
|
[] | null | null | 7 | null | null |
|
CVE-2020-28612
|
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->svertices_begin().
|
[
"cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 10 | null | null |
|
CVE-2018-5889
|
While processing a compressed kernel image, a buffer overflow can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
GHSA-w499-gpr6-v77v
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-43200
|
This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
|
[] | null | 4.8 | null | null | null |
|
GHSA-vpph-4gj9-3q58
|
Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xhph-vfmh-3pw9
|
Cross-site scripting (XSS) vulnerability in the management screen in myLittleTools myLittleAdmin for SQL Server 2000 allows remote attackers to inject arbitrary web script or HTML via vectors that trigger a crafted database entry.
|
[] | null | null | null | null | null |
|
CVE-2019-5787
|
Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
RHSA-2019:3889
|
Red Hat Security Advisory: kernel security update
|
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.8 | null | null |
GHSA-4cxm-9rxq-69rw
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Usta" AYBS allows SQL Injection.This issue affects AYBS: before 1.0.3.
|
[] | null | 8.8 | null | null | null |
|
GHSA-w67q-6x4j-95rh
|
Cross-site scripting (XSS) vulnerability in signup.asp in Pre Classified Listings 1.0 allows remote attackers to inject arbitrary web script or HTML via the address parameter.
|
[] | null | null | null | null | null |
|
GHSA-2xmw-23qh-mjvr
|
X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.
|
[] | null | null | null | null | null |
|
CVE-2021-24278
|
Redirection for Contact Form 7 < 2.3.4 - Unauthenticated Arbitrary Nonce Generation
|
In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, unauthenticated users can use the wpcf7r_get_nonce AJAX action to retrieve a valid nonce for any WordPress action/function.
|
[
"cpe:2.3:a:querysol:redirection_for_contact_form_7:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | 5 | null |
CVE-2017-9709
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a privilege escalation vulnerability exists in telephony.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-2vhv-xj4g-f2fq
|
Cross-site scripting vulnerability in Modern Events Calendar Lite versions prior to 6.3.0 allows remote an authenticated attacker to inject an arbitrary script via unspecified vectors.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2022:4771
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null | null |
CVE-2008-4969
|
ltp-network-test 20060918 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/vsftpd.conf, (b) /tmp/udp/2/*, (c) /tmp/tcp/2/*, (d) /tmp/udp/3/*, (e) /tmp/tcp/3/*, (f) /tmp/nfs_fsstress.udp.2.log, (g) /tmp/nfs_fsstress.udp.3.log, (h) /tmp/nfs_fsstress.tcp.2.log, (i) /tmp/nfs_fsstress.tcp.3.log, and (j) /tmp/nfs_fsstress.sardata temporary files, related to the (1) ftp_setup_vsftp_conf and (2) nfs_fsstress.sh scripts.
|
[
"cpe:2.3:a:alastair_mckinstry:ltp-network-test:20060918:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-v68f-x6fc-xjfh
|
Microsoft Internet Explorer 6.0 SP1 and possibly other versions allows remote attackers to cause a denial of service and possibly execute arbitrary code by instantiating COM objects as ActiveX controls, including (1) imskdic.dll (Microsoft IME), (2) chtskdic.dll (Microsoft IME), and (3) msoe.dll (Outlook), which leads to memory corruption. NOTE: it is not certain whether the issue is in Internet Explorer or the individual DLL files.
|
[] | null | null | null | null | null |
|
GHSA-h2v5-5p47-rmq3
|
IBM DOORS Next Generation (DNG/RRC) 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134064.
|
[] | null | null | 5.4 | null | null |
|
GHSA-26pm-g3r3-95jw
|
Multiple SQL injection vulnerabilities in DevelopItEasy Events Calendar 1.2 allow remote attackers to execute arbitrary SQL commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2015-1894
|
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
|
[
"cpe:2.3:a:ibm:optim_workload_replay:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:optim_workload_replay:2.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:optim_workload_replay:2.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2020-2157
|
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.
|
[
"cpe:2.3:a:jenkins:skytap_cloud_ci:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 | null |
|
GHSA-6537-hg9g-m5mp
|
A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.
|
[] | null | 9.1 | null | null | null |
|
CVE-2005-1667
|
DataTrac Activity Console 1.1 allows remote attackers to cause a denial of service via a long HTTP GET request.
|
[
"cpe:2.3:a:datatrac:activity_console:1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-jrhx-6rvp-6v57
|
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset.
|
[] | null | null | null | null | null |
|
CVE-2020-10409
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-template.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2024-22255
|
Information disclosure vulnerability
|
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
|
[] | null | 7.1 | null | null | null |
GHSA-h4q7-599w-vqhv
|
XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x000000000032e849.
|
[] | null | null | null | null | null |
|
GHSA-hw2f-h9gc-5p9j
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhanendran Rajagopal Term Taxonomy Converter allows Reflected XSS. This issue affects Term Taxonomy Converter: from n/a through 1.2.
|
[] | null | 7.1 | null | null | null |
|
GHSA-3h9q-4c3c-c78x
|
A vulnerability, which was classified as problematic, has been found in Campcodes School Management Software 1.0. This issue affects some unknown processing of the file /create-id-card of the component Create Id Card Page. The manipulation of the argument ID Card Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 2.4 | null | null | null |
|
GHSA-qj5r-f9mv-rffh
|
`CHECK`-fails when building invalid tensor shapes in Tensorflow
|
ImpactMultiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes.PatchesWe have patched the reported issues in multiple GitHub commits. It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
[] | 7.1 | 6.5 | null | null | null |
GHSA-5wwq-px8f-22r4
|
The AXM-NET module in Accuenergy Acuvim II NET Firmware 3.08 and Acuvim IIR NET Firmware 3.08 allows remote attackers to discover settings via a direct request to an unspecified URL.
|
[] | null | null | 8.6 | null | null |
|
GHSA-952w-jx2h-f8q6
|
A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1120.
|
[] | null | null | null | null | null |
|
GHSA-7mh7-3x3q-qg62
|
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-48q8-4r5f-p5pf
|
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.
This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
|
[] | null | 4.1 | null | null | null |
|
GHSA-5f4r-g29m-jw8q
|
Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.
|
[] | null | 4.6 | null | null | null |
|
GHSA-99p6-6hvf-f2f2
|
Cross-site scripting (XSS) vulnerability in the search module in Inter Network Marketing (INM) CMS G3 allows remote attackers to inject arbitrary web script or HTML via the search_string parameter.
|
[] | null | null | null | null | null |
|
RHSA-2011:0839
|
Red Hat Security Advisory: gimp security update
|
Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null | null |
CVE-2021-44225
|
In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
|
[
"cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.5 | null |
|
GHSA-j4g2-785h-m856
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in namithjawahar Wp-Insert plugin <= 2.5.0 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-v4r6-962q-6q53
|
A buffer overflow vulnerability in FTPDMIN 0.96 allows attackers to crash the server via a crafted packet.
|
[] | null | null | null | null | null |
|
GHSA-553m-p4h3-3fm6
|
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded DSA SSH key for the root account.
|
[] | null | null | null | null | null |
|
CVE-2014-2368
|
The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.
|
[
"cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-j4wf-9c2c-mqww
|
BeyondTrust Privilege Management for Windows and Mac (aka PMWM; formerly Avecto Defendpoint) 5.1 through 5.5 before 5.5 SR1 mishandles command-line arguments with PowerShell .ps1 file extensions present, leading to a DefendpointService.exe crash.
|
[] | null | null | null | null | null |
|
CVE-2024-49234
|
WordPress Plexx Elementor Extension plugin <= 1.3.4 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in themeworm Plexx Elementor Extension allows Stored XSS.This issue affects Plexx Elementor Extension: from n/a through 1.3.4.
|
[
"cpe:2.3:a:themeworm:plexx_elementor_extension:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2015-6317
|
Cisco Identity Services Engine (ISE) before 2.0 allows remote authenticated users to bypass intended web-resource access restrictions via a direct request, aka Bug ID CSCuu45926.
|
[
"cpe:2.3:a:cisco:identity_services_engine_software:1.0.4.573:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.0_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.0_mr_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.1_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(0.747\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(0.793\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(1.198\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(1.901\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2.0.899:p14:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.2_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(0.722\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(0.876\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(106.146\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(120.135\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.109\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.181\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.253\\):*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 | null |
|
GHSA-384c-q74f-g7hv
|
Missing authorization vulnerability exists in EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark? firmware version 1.0.1 and earlier. A successful exploitation may result in a specially crafted firmware update or unofficial firmware update being applied without user's consent via unspecified vector.
|
[] | null | null | null | null | null |
|
GHSA-9r7v-c6vc-2x9c
|
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
|
[] | null | null | 3.3 | null | null |
|
GHSA-m3fg-79jj-j423
|
The relevant plugin before 1.0.8 for WordPress has XSS.
|
[] | null | null | null | null | null |
|
RHSA-2016:1594
|
Red Hat Security Advisory: python-django security update
|
django: XSS in admin's add/change related popup
|
[
"cpe:/a:redhat:openstack-optools:8::el7"
] | null | null | 6.1 | null | null |
GHSA-r79w-4gmj-3cfw
|
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xwfw-c659-qjpj
|
ircu 2.10.12.01 through 2.10.12.04 does not remove ops privilege after a join from a server with an older timestamp (TS), which allows remote attackers to gain control of a channel during a split.
|
[] | null | null | null | null | null |
|
CVE-2012-1475
|
Unspecified vulnerability in the YagattaTalk Messenger (com.iskoot.yagatta.yagattatalk) application 1.00.01.08 for Android has unknown impact and attack vectors.
|
[
"cpe:2.3:a:qualcomm:yagattatalk_messenger:1.00.01.08:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-5p49-gvj5-jfx2
|
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
|
[] | null | null | null | null | null |
|
CVE-2015-1984
|
IBM InfoSphere Master Data Management Collaborative Edition 9.1, 10.1, 11.0, 11.3, and 11.4 before FP03 allows remote authenticated users to bypass intended access restrictions and read arbitrary profiles via unspecified vectors, as demonstrated by discovering usernames for use in brute-force attacks.
|
[
"cpe:2.3:a:ibm:infosphere_master_data_management:9.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:10.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.0:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.3:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.4:*:*:*:collaborative:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2022-34390
|
Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
|
[
"cpe:2.3:o:dell:alienware_area-51_r5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_area-51_r5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_area-51_r4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_area-51_r4:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2009-0812
|
Stack-based buffer overflow in BreakPoint Software Hex Workshop 4.23, 6.0.1.4603, and other 6.x and earlier versions allows remote attackers to execute arbitrary code via a crafted Intel Hex Code (.hex) file. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:bpsoft:hex_workshop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.53:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:2.54:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:bpsoft:hex_workshop:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-qrwx-969j-2cxc
|
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 7.4 | 8.8 | null | null | null |
|
RHSA-2020:2305
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.34 openshift-enterprise-apb-tools-container security update
|
openshift/apb-tools: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null | null |
CVE-2023-38602
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-53r8-3f8w-9g8r
|
Unspecified vulnerability in Adobe Flash Player 9.0.47.0 and earlier, when running on Opera before 9.24 on Mac OS X, has unknown "Highly Severe" impact and unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-qf6g-2vj6-4q65
|
The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes.
|
[] | null | 6.1 | null | null | null |
|
GHSA-m6f7-q6m8-788v
|
The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
|
[] | null | null | 5.5 | null | null |
|
GHSA-m95x-53px-rf76
|
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 4.4 | null | null | null |
|
CVE-2021-22980
|
In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
[
"cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 | null |
|
CVE-2013-2317
|
The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window.
|
[
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:-:black:*:*:*:*:*",
"cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.0:-:black:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
PYSEC-2021-214
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) assumes that the `orig_input_shape` and `grad` tensors have similar first and last dimensions but does not check that this assumption is validated. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.