id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-8226-6jj5-9jvr
|
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
|
[] | 9.3 | 9.8 | null | null | null |
|
GHSA-jf7j-3xj9-6m3j
|
SQL injection vulnerability in ESRI ArcGIS for Server through 10.2 allows remote attackers to execute arbitrary SQL commands via unspecified input to the map or feature service.
|
[] | null | null | null | null | null |
|
GHSA-g8h7-2pwh-pvpv
|
NVIDIA DGX H100 BMC contains a vulnerability in the KVM service, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, and information disclosure.
|
[] | null | 8 | null | null | null |
|
GHSA-78p3-88v5-4j32
|
Ashlar-Vellum Cobalt LI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LI files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25348.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2023:4074
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null | null |
RHSA-2007:1083
|
Red Hat Security Advisory: thunderbird security update
|
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null | null |
CVE-2019-1833
|
Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability
|
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.
|
[
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*"
] | null | null | 5.8 | null | null |
CVE-2015-6140
|
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6142, CVE-2015-6143, CVE-2015-6153, CVE-2015-6158, CVE-2015-6159, and CVE-2015-6160.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2022-3415
|
Chat Bubble < 2.3 - Unauthenticated Stored Cross-Site Scripting
|
The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
|
[
"cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2018-2996
|
Vulnerability in the Oracle Applications Manager component of Oracle E-Business Suite (subcomponent: Oracle Diagnostics Interfaces). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.2.7:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2018-7470
|
An issue was discovered in ImageMagick 7.0.7-22 Q16. The IsWEBPImageLossless function in coders/webp.c allows attackers to cause a denial of service (segmentation violation) via a crafted file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-22:q16:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2024-54432
|
WordPress WP Flipkart Importer plugin <= 1.4 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Shambhu Prasad Patnaik WP Flipkart Importer allows Stored XSS.This issue affects WP Flipkart Importer: from n/a through 1.4.
|
[] | null | 7.1 | null | null | null |
GHSA-28gj-gwmg-7wcf
|
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'verified' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-4817
|
The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption.
|
[
"cpe:2.3:a:adobe:download_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:unknown:3d:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:unknown:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:unknown:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:3d:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
RHSA-2023:0975
|
Red Hat Security Advisory: zlib security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 8.2 | null | null | null |
RHSA-2022:0830
|
Red Hat Security Advisory: .NET 5.0 security and bugfix update
|
brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.3 | null | null | null |
GHSA-96ph-frjp-7qq2
|
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing input validation in the addCustomCode function in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary JavaScript files to the affected site's server.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-3558
|
Custom Field Suite <= 2.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via cfs[post_title]
|
The Custom Field Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the 'cfs[post_title]' parameter versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:custom_field_suite_project:custom_field_suite:-:*:*:*:*:*:*:*",
"cpe:2.3:a:custom_field_suite_project:custom_field_suite:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null |
CVE-2021-20621
|
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
|
[
"cpe:2.3:o:aterm:wg2600hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg2600hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg2600hp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2024-11147
|
ECOVACS lawnmowers and vacuums deterministic root password
|
ECOVACS robot lawnmowers and vacuums use a deterministic root password generated based on model and serial number. An attacker with shell access can login as root.
|
[] | 7 | 7.6 | null | null | null |
RHSA-2021:4724
|
Red Hat Security Advisory: devtoolset-10-annobin security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null | null |
GHSA-h35x-4f36-345v
|
In the Linux kernel, the following vulnerability has been resolved:accel/ivpu: Prevent recovery invocation during probe and resumeRefactor IPC send and receive functions to allow correct
handling of operations that should not trigger a recovery process.Expose ivpu_send_receive_internal(), which is now utilized by the D0i3
entry, DCT initialization, and HWS initialization functions.
These functions have been modified to return error codes gracefully,
rather than initiating recovery.The updated functions are invoked within ivpu_probe() and ivpu_resume(),
ensuring that any errors encountered during these stages result in a proper
teardown or shutdown sequence. The previous approach of triggering recovery
within these functions could lead to a race condition, potentially causing
undefined behavior and kernel crashes due to null pointer dereferences.
|
[] | null | 4.7 | null | null | null |
|
RHSA-2013:0726
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.1 update
|
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null | null |
CVE-2025-46946
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2025-30804
|
WordPress wpShopGermany IT-RECHT KANZLEI plugin <= 2.0 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in maennchen1.de wpShopGermany IT-RECHT KANZLEI allows Cross Site Request Forgery. This issue affects wpShopGermany IT-RECHT KANZLEI: from n/a through 2.0.
|
[] | null | 4.3 | null | null | null |
GHSA-8h72-qf2q-h5jc
|
The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-rg2c-cfxv-qp6f
|
Denial of service in jackson-dataformats-text
|
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
|
[] | null | 8.6 | null | null | null |
CVE-2021-40475
|
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
|
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*"
] | null | 5.5 | null | null | null |
GHSA-c5gr-hg39-gr5m
|
An issue was discovered in the controller unit of the OpenRISC mor1kx processor. The read/write access permissions to the Exception Program Counter Register (EPCR) are not implemented correctly. User programs from an unauthorized privilege level can make read/write accesses to EPCR.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-41093
|
Loss of confidentiality due to potential race condition in Bluetooth controller Connection_Handle reuse
|
Use After Free vulnerability in Silicon Labs Bluetooth SDK on 32 bit, ARM may allow an attacker with precise timing capabilities to intercept a small number of packets intended for a recipient that has left the network.This issue affects Silabs Bluetooth SDK: through 8.0.0.
|
[
"cpe:2.3:a:silabs:bluetooth_low_energy_software_development_kit:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
GHSA-xqmg-px28-29cq
|
Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-23876
|
WordPress WP krpano plugin <= 1.2.1 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jens Remus WP krpano allows Stored XSS.This issue affects WP krpano: from n/a through 1.2.1.
|
[] | null | 6.5 | null | null | null |
CVE-2024-20396
|
A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.
This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests.
|
[] | null | 5.3 | null | null | null |
|
CVE-2020-7949
|
schemasystem.dll in Valve Dota 2 before 7.23f allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, because a crafted map is mishandled during a GetValue call.
|
[
"cpe:2.3:a:valvesoftware:dota_2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
RHSA-2024:10953
|
Red Hat Security Advisory: python36:3.6 security update
|
virtualenv: potential command injection via virtual environment activation scripts
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null | null |
RHSA-2017:0558
|
Red Hat Security Advisory: firefox security update
|
Mozilla: integer overflow in createImageBitmap() (MFSA 2017-08)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null | null |
CVE-2020-11791
|
NETGEAR JGS516PE devices before 2.6.0.43 are affected by reflected XSS.
|
[
"cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*"
] | null | null | 5.2 | null | null |
|
CVE-2021-45979
|
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API.
|
[
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-wjx2-7hqq-8h7m
|
rails_admin ruby gem XSS vulnerability
|
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
|
[] | null | 6.1 | null | null | null |
CVE-1999-1312
|
Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and OpenVMS AXP 1.0, allows local users to gain system privileges.
|
[
"cpe:2.3:a:dec:dec_openvms_axp:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dec:dec_openvms_vax:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-5954-58x3-phm4
|
The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-41194
|
Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Postscript (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
|
[
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-h494-xfhr-2w3j
|
An issue was discovered in Dalmann OCPP.Core before 1.3.0 for OCPP (Open Charge Point Protocol) for electric vehicles. A StopTransaction message with any random transactionId terminates active transactions.
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-6968
|
Honeywell INNCOM INNControl 3 allows workstation users to escalate application user privileges through the modification of local configuration files.
|
[
"cpe:2.3:o:honeywell:inncom_inncontrol_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:inncom_inncontrol:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
RHSA-2017:0565
|
Red Hat Security Advisory: ocaml security update
|
ocaml: sizes arguments are sign-extended from 32 to 64 bits
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-q6g2-4gw5-gw53
|
A vulnerability classified as critical has been found in KylinSoft kylin-system-updater up to 2.0.5.16-0k2.33. Affected is an unknown function of the file /usr/share/kylin-system-updater/SystemUpdater/UpgradeStrategiesDbus.py of the component com.kylin.systemupgrade Service. The manipulation of the argument SetDownloadspeedMax leads to os command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 5.3 | null | null | null |
|
PYSEC-2021-792
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313). The [`GetVariableInput` function](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L115-L119) can return a null pointer but `GetTensorData` assumes that the argument is always a valid tensor. Furthermore, because `GetVariableInput` calls [`GetMutableInput`](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L82-L90) which might return `nullptr`, the `tensor->is_variable` expression can also trigger a null pointer exception. We have patched the issue in GitHub commit 5b048e87e4e55990dae6b547add4dae59f4e1c76. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2022-24961
|
In Portainer Agent before 2.11.1, an API server can continue running even if not associated with a Portainer instance in the past few days.
|
[
"cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2023-51947
|
Improper access control on nasSvr.php in actidata actiNAS SL 2U-8 RDX 3.2.03-SP1 allows remote attackers to read and modify different types of data without authentication.
|
[
"cpe:2.3:o:actidata:actinas_sl_2u-8_rdx_firmware:3.2.03:sp1:*:*:*:*:*:*",
"cpe:2.3:h:actidata:actinas_sl_2u-8_rdx:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
CVE-2005-1638
|
The _writeAttrs function in SafeHTML before 1.3.2 does not properly handle quotes in attribute values, which could allow remote attackers to exploit cross-site scripting (XSS) vulnerabilities in applications that rely on SafeHTML for protection.
|
[
"cpe:2.3:a:pixel-apes_group:safehtml:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pixel-apes_group:safehtml:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pixel-apes_group:safehtml:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pixel-apes_group:safehtml:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pixel-apes_group:safehtml:1.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
ICSA-21-145-02
|
Rockwell Automation Micro800 and MicroLogix 1400
|
When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller causing a denial-of-service condition.CVE-2021-32926 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H).
|
[] | null | null | 6.1 | null | null |
CVE-2024-38358
|
Symlink bypasses filesystem sandbox in wasmer
|
Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can also crash the runtime by creating a symlink pointing outside with `path_symlink` and `path_open`ing the link. This issue has been addressed in commit `b9483d022` which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:wasmer:wasmer:*:*:*:*:*:rust:*:*"
] | null | 2.9 | null | null | null |
GHSA-5gqr-fp8v-rc24
|
Miredo 0.9.8 through 1.0.5 does not properly authenticate a Teredo bubble during UDP hole punching with HMAC-MD5-64 hashing, which allows remote attackers to impersonate an arbitrary Teredo client.
|
[] | null | null | null | null | null |
|
CVE-2019-13122
|
A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix.
|
[
"cpe:2.3:a:ozlabs:patchwork:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ozlabs:patchwork:2.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ozlabs:patchwork:2.1.0:rc2:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2024-56567
|
ad7780: fix division by zero in ad7780_write_raw()
|
In the Linux kernel, the following vulnerability has been resolved:
ad7780: fix division by zero in ad7780_write_raw()
In the ad7780_write_raw() , val2 can be zero, which might lead to a
division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw()
is based on iio_info's write_raw. While val is explicitly declared that
can be zero (in read mode), val2 is not specified to be non-zero.
|
[] | null | 5.5 | null | null | null |
GHSA-2f5p-8xjh-f2m8
|
CFNetwork in Apple iOS before 10 and OS X before 10.12 mishandles Local Storage deletion, which allows local users to discover the visited web sites of arbitrary users via unspecified vectors.
|
[] | null | null | 4 | null | null |
|
ICSA-22-277-04
|
OMRON CX-Programmer
|
The affected product is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.CVE-2022-3398 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.CVE-2022-3396 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.CVE-2022-3397 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
CVE-2021-4314
|
It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesn’t have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isn’t. It’s possible to use this to persuade the southbound service that different user is authenticated.
|
[
"cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-6gpx-44mf-5m57
|
Multiple buffer overflows in the Novell Client novfs module for the Linux kernel in SUSE Linux Enterprise 11 SP1 and openSUSE 11.3 allow local users to gain privileges via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-wm46-wfpj-pgf7
|
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | null | null | null |
|
GHSA-3cpg-c2v9-mf28
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, R6400v2 before 1.0.2.34, R6700 before 1.0.1.30, R6900 before 1.0.1.30, R6900P before 1.0.0.62, R7000 before 1.0.9.12, R7000P before 1.0.0.62, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
|
[] | null | null | null | null | null |
|
RHSA-2017:2771
|
Red Hat Security Advisory: emacs security update
|
emacs: command injection flaw within "enriched mode" handling
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null | null |
CVE-2022-22475
|
IBM WebSphere Application Server Liberty and Open Liberty 17.0.0.3 through 22.0.0.5 are vulnerable to identity spoofing by an authenticated user. IBM X-Force ID: 225603.
|
[
"cpe:2.3:a:ibm:open_liberty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*"
] | null | null | 5 | null | null |
|
GHSA-rjv3-2qfq-x6pf
|
In SoundTriggerHwService, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-146894086
|
[] | null | null | null | null | null |
|
CVE-2017-9192
|
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the ReadImage function in input-tga.c:528:7.
|
[
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
RHSA-2003:342
|
Red Hat Security Advisory: : Updated EPIC packages fix security vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null | null |
CVE-2021-22306
|
There is an out-of-bound read vulnerability in Mate 30 10.0.0.182(C00E180R6P2). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause out-of-bound, compromising normal service.
|
[
"cpe:2.3:o:huawei:mate_30_firmware:10.0.0.182\\(c00e180r6p2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 | null |
|
CVE-2015-0209
|
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2012-5539
|
The Organic Groups (OG) module 7.x-1.x before 7.x-1.5 for Drupal does not properly maintain pending group memberships, which allows remote authenticated users to post to arbitrary groups by modifying their own account while a pending membership is waiting to be approved.
|
[
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:organic_groups_project:organic_groups:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2020-3761
|
ColdFusion versions ColdFusion 2016, and ColdFusion 2018 have a remote file read vulnerability. Successful exploitation could lead to arbitrary file read from the coldfusion install directory.
|
[
"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update13:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-59q3-mh2g-ppq7
|
Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
|
[] | null | 6.8 | null | null | null |
|
ICSA-17-164-02
|
OSIsoft PI Server 2017
|
PI Data Archive has protocol flaws with the potential to expose change records in the clear and allow a malicious party to spoof a server within a collective.CVE-2017-7930 has been assigned to this vulnerability. OSIsoft calculated a CVSS v3 base score of 8.9; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L). PI Network Manager using older protocol versions contains a flaw that could allow a malicious user to authenticate with a server and then cause PI Network Manager to behave in an undefined manner.CVE-2017-7934 has been assigned to this vulnerability. OSIsoft calculated a CVSS v3 base score of 5.9; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 5.9 | null | null |
GHSA-26mf-pq9r-c4cw
|
The WP Lightbox 2 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 3.0.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
CVE-2023-28197
|
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to access user-sensitive data.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-93p5-8fqw-wjx3
|
Authentication bypass by capture-replay in github.com/cosmos/ethermint
|
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.Specific Go Packages Affectedgithub.com/cosmos/ethermint/rpc/namespaces/eth
|
[] | null | 7.5 | null | null | null |
CVE-2019-9321
|
In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111208713
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2024-7764
|
SQL Injection in vanna-ai/vanna
|
Vanna-ai v0.6.2 is vulnerable to SQL Injection due to insufficient protection against injecting additional SQL commands from user requests. The vulnerability occurs when the `generate_sql` function calls `extract_sql` with the LLM response. An attacker can include a semi-colon between a search data field and their own command, causing the `extract_sql` function to remove all LLM generated SQL and execute the attacker's command if it passes the `is_sql_valid` function. This allows the execution of user-defined SQL beyond the expected boundaries, notably the trained schema.
|
[] | null | null | 8.1 | null | null |
CVE-2020-18780
|
A Use After Free vulnerability in function new_Token in asm/preproc.c in nasm 2.14.02 allows attackers to cause a denial of service via crafted nasm command.
|
[
"cpe:2.3:a:nasm:netwide_assembler:2.14.02:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-866h-7g87-7xj6
|
An issue was discovered in Collabtive 3.0 and later. managefile.php is vulnerable to XSS: when the action parameter is set to movefile and the id parameter corresponds to a project the current user has access to, the file and target parameters are reflected.
|
[] | null | null | null | null | null |
|
GHSA-6r6g-263h-fpjq
|
Improper Privilege Management vulnerability in WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels allows Privilege Escalation.This issue affects WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels: from n/a through 4.2.1.
|
[] | null | 7.2 | null | null | null |
|
GHSA-4576-cf38-77f2
|
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
|
[] | null | 7.5 | null | null | null |
|
GHSA-pppp-7q7h-g8w7
|
Nadeo Game Engine for Nadeo TrackMania and Nadeo Virtual Skipper 3 allows remote attackers to cause a denial of service (server crash) via malformed data to TCP port 2350, possibly due to long values or incorrect size fields.
|
[] | null | null | null | null | null |
|
CVE-2022-3799
|
IBAX go-ibax tablesInfo sql injection
|
A vulnerability classified as critical was found in IBAX go-ibax. Affected by this vulnerability is an unknown functionality of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212635.
|
[
"cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2023-27501
|
Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
|
SAP NetWeaver AS for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, allows an attacker to exploit insufficient validation of path information provided by users, thus exploiting a directory traversal flaw in an available service to delete system files. In this attack, no data can be read but potentially critical OS files can be deleted making the system unavailable, causing significant impact on both availability and integrity
|
[
"cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:791:*:*:*:*:*:*:*"
] | null | 8.7 | null | null | null |
CVE-2015-2305
|
Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
|
[
"cpe:2.3:a:rxspencer_project:rxspencer:3.8.g5:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-qggw-79c9-7rqv
|
An issue was discovered in COROS PACE 3 through 3.0808.0. Due to a NULL pointer dereference vulnerability, sending a crafted BLE message forces the device to reboot.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-8342
|
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8343.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2010-3678
|
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
|
[
"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2025-21338
|
GDI+ Remote Code Execution Vulnerability
|
GDI+ Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
CVE-2023-4337
|
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
|
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
|
[
"cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2023-38313
|
An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3.
|
[
"cpe:2.3:a:opennds:captive_portal:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-51296
|
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the pingtrace function.
|
[
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-qj2x-5f28-cg38
|
In the Linux kernel, the following vulnerability has been resolved:tty: synclink_gt: Fix null-pointer-dereference in slgt_clean()When the driver fails at alloc_hdlcdev(), and then we remove the driver
module, we will get the following splat:[ 25.065966] general protection fault, probably for non-canonical address 0xdffffc0000000182: 0000 [#1] PREEMPT SMP KASAN PTI
[ 25.066914] KASAN: null-ptr-deref in range [0x0000000000000c10-0x0000000000000c17]
[ 25.069262] RIP: 0010:detach_hdlc_protocol+0x2a/0x3e0
[ 25.077709] Call Trace:
[ 25.077924] <TASK>
[ 25.078108] unregister_hdlc_device+0x16/0x30
[ 25.078481] slgt_cleanup+0x157/0x9f0 [synclink_gt]Fix this by checking whether the 'info->netdev' is a null pointer first.
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-27918
|
encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.
|
[
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2020-25462
|
Heap buffer overflow in the fxCheckArrowFunction function at moddable/xs/sources/xsSyntaxical.c:3562 in Moddable SDK before OS200903.
|
[
"cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-mw3c-p8vx-hf5q
|
Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 stores the Application Identity Account password in memory in cleartext, which allows local users to gain privileges and modify clients of the Deployment Solution Server.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-43135
|
WordPress WPCafe plugin <= 2.2.28 - Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion.This issue affects WPCafe: from n/a through 2.2.28.
|
[
"cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
GHSA-f9vh-fjmh-q969
|
The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not ensure that the package to be deleted is a package, allowing any authenticated users, such as subscriber to delete arbitrary posts
|
[] | null | 5.4 | null | null | null |
|
CVE-2009-2474
|
neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
|
[
"cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2015-0437
|
Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
|
[
"cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.