id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-3phf-8x93-jmv2
A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.
[]
null
6.1
null
null
null
CVE-2018-15763
PKS leaks IaaS Credentials to Application Logs
Pivotal Container Service, versions prior to 1.2.0, contains an information disclosure vulnerability which exposes IaaS credentials to application logs. A malicious user with access to application logs may be able to obtain IaaS credentials and perform actions using these credentials.
[ "cpe:2.3:a:pivotal_software:pivotal_container_service:*:*:*:*:*:*:*:*" ]
null
null
9
null
null
RHSA-2018:0648
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
null
GHSA-mf76-jwrw-cxr8
A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.
[]
null
null
null
null
null
GHSA-qg2r-g932-mwff
In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges and a Firmware compromise needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139424089
[]
null
null
null
null
null
GHSA-jv5g-24q3-2ffw
SQL injection vulnerability in cn_users.php in CzarNews 1.20 and earlier allows remote attackers to execute arbitrary SQL commands via a recook cookie.
[]
null
null
null
null
null
GHSA-vcpm-vcmc-m56v
A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. This affects an unknown part of the file /client/UnChkMailApplication.jsp. The manipulation of the argument typename leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
null
null
null
GHSA-x5qv-3jp4-jf27
SQL injection vulnerability in ajax.php in Gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary SQL commands via the rsargs array parameter in an __exp__getFeedContent action.
[]
null
null
null
null
null
GHSA-83cw-ph9g-5p57
The shortcodes-ultimate plugin before 5.0.1 for WordPress has remote code execution via a filter in a meta, post, or user shortcode.
[]
null
null
9.8
null
null
GHSA-w6f7-5v79-v5cg
An untrusted search path vulnerability in testinitsigs.exe as used in Bitdefender Antivirus Free 2020 allows a low-privilege attacker to execute code as SYSTEM via a specially crafted DLL file.
[]
8.8
7.8
null
null
null
GHSA-xx7x-j67h-66rj
The BulletProof Security WordPress plugin before 6.1 does not sanitize and escape some of its CAPTCHA settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
[]
null
4.8
null
null
null
GHSA-68hx-hv9v-7v3w
In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the buffer was identified. Reported by Jason Geffner.
[]
null
7.5
null
null
null
RHSA-2013:1518
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-26) flash-plugin: multiple code execution flaws (APSB13-26)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
CVE-2023-45047
WordPress LeadSquared Suite Plugin <= 0.7.4 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in LeadSquared, Inc LeadSquared Suite plugin <= 0.7.4 versions.
[ "cpe:2.3:a:leadsquared:leadsquared_suite:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2022-47975
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-4j38-964f-658r
Zoho ManageEngine ADSelfService Plus through 6101 is vulnerable to unauthenticated Remote Code Execution while changing the password.
[]
null
9.8
null
null
null
RHSA-2011:1799
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" ]
null
null
null
null
null
GHSA-w67p-2pxq-7v84
The Rife Elementor Extensions & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Writing Effect Headline shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2024-7261
The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.
[ "cpe:2.3:o:zyxel:usg_lite_60ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1123acv3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax655e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wbe530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa110ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa110ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1123-ac_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1123-ac_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1123acv3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1123acv3:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa130be_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa130be:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa210ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa210ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa220ax-6e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa220ax-6e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa50ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa50ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa50ax_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa50ax_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa55axe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa55axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa90ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa90ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa90ax_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa90ax_pro:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_lite_60ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac500:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac500h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac6103d-i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac6103d-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac6502d-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac6502d-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac6503d-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac6503d-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac6552d-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac6552d-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wac6553d-e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wac6553d-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax300h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax510d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax510d:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax610d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax610d:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax620d-6e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax620d-6e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax630s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax630s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax640s-6e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax640s-6e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax650s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax650s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wax655e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wax655e:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wbe530:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:wbe660s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:wbe660s:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-2mjj-frg5-8m3j
ACDSee Free 1.1.21 has a User Mode Write AV starting at IDE_ACDStd!IEP_SetColorProfile+0x00000000000b9c2f.
[]
null
null
null
null
null
GHSA-6mhg-333v-q39c
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
null
GHSA-hg68-w53w-phj5
Cross-site scripting (XSS) vulnerability in index.php in Nuked-Klan 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-v7gx-3c46-37v4
Cross-site request forgery (CSRF) vulnerability in DDSN Interactive cm3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions, allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
null
CVE-2020-16101
It is possible for an unauthenticated remote DCOM websocket connection to crash the Command Centre service due to an out-of-bounds buffer access. Affected versions are v8.20 prior to v8.20.1166(MR3), v8.10 prior to v8.10.1211(MR5), v8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier.
[ "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.00.1228:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.10.1211:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.20.1166:-:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-2r2v-2jgp-6j72
index.php in PHP Links allows remote attackers to gain sensitive information via an invalid show parameter, which reveals the full path in an error message.
[]
null
null
null
null
null
GHSA-j72x-hrff-cm37
CMS Made Simple (CMSMS) 2.2.14 allows stored XSS via the Extensions > Fie Picker..
[]
null
null
null
null
null
GHSA-7qrc-wm75-hvh3
Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.
[]
null
7.5
null
null
null
GHSA-gpf3-4fw6-p76w
A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.
[]
null
9.8
null
null
null
GHSA-c3qh-423w-97gw
This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to read sensitive location information
[]
null
5.5
null
null
null
CVE-2024-46938
An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files.
[ "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-65h5-996j-w6qc
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended access restrictions, and create administrative accounts or read data from arbitrary tenant domains, via a crafted URL, aka Bug IDs CSCus62671 and CSCus62652.
[]
null
null
null
null
null
CVE-2023-4708
Infosoftbd Clcknshop GET Parameter all sql injection
A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /collection/all of the component GET Parameter Handler. The manipulation of the argument tag leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-238571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:infosoftbd:clcknshop:1.0.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
GHSA-f7mm-6f83-q4xx
HiveOS through 0.6-102@191212 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-09-26, the vendor indicated that they would consider fixing this.
[]
null
5.7
null
null
null
CVE-2024-4679
Folder Permission Vulnerability in JP1/Extensible SNMP Agent
Incorrect Default Permissions vulnerability in Hitachi JP1/Extensible SNMP Agent for Windows, Hitachi JP1/Extensible SNMP Agent on Windows, Hitachi Job Management Partner1/Extensible SNMP Agent on Windows allows File Manipulation.This issue affects JP1/Extensible SNMP Agent for Windows: from 12-00 before 12-00-01, from 11-00 through 11-00-*; JP1/Extensible SNMP Agent: from 10-10 through 10-10-01, from 10-00 through 10-00-02, from 09-00 through 09-00-04; Job Management Partner1/Extensible SNMP Agent: from 10-10 through 10-10-01, from 10-00 through 10-00-02, from 09-00 through 09-00-04.
[ "cpe:2.3:a:hitachi:jp1\\/extensible_snmp_agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner1\\/extensible_snmp_agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/extensible_snmp_agent:*:*:*:*:*:windows:*:*" ]
null
7.8
null
null
null
CVE-2007-0382
Multiple SQL injection vulnerabilities in letterman.class.php in the Letterman 1.2.3 (com_letterman) component for Joomla! before 1.0.12 allow remote attackers to execute arbitrary SQL commands via the id parameter, related to the (1) lm_sendMail, (2) saveNewsletter, and (3) cancelNewsletter functions.
[ "cpe:2.3:a:letterman:letterman:1.2.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2013-2044
Open redirect vulnerability in the Login Page (index.php) in ownCloud before 5.0.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-r24q-vj7p-78xf
Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20468.
[]
null
null
3.3
null
null
CVE-2004-0103
crawl before 4.0.0 beta23 does not properly "apply a size check" when copying a certain environment variable, which may allow local users to gain privileges, possibly as a result of a buffer overflow.
[ "cpe:2.3:a:linley_henzell:crawl:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-2qfx-rcv3-25r2
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
[]
null
null
null
null
null
CVE-2024-9431
Improper Privilege Management in transformeroptimus/superagi
In version v0.0.14 of transformeroptimus/superagi, there is an improper privilege management vulnerability. After logging into the system, users can change the passwords of other users, leading to potential account takeover.
[]
null
null
6.5
null
null
GHSA-2g95-fmgh-m88h
Vulnerability in the Oracle iSupport component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
null
GHSA-j7mh-fcjh-vp2q
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the News Menu component.
[]
null
5.4
null
null
null
GHSA-499x-cvfw-94w6
uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
[]
null
9.8
null
null
null
CVE-2024-53024
NULL Pointer Dereference in Display
Memory corruption in display driver while detaching a device.
[]
null
7.8
null
null
null
CVE-2024-9385
Themify Builder <= 7.6.2 - Reflected Cross-Site Scripting
The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
RHSA-2008:0038
Red Hat Security Advisory: postgresql security update
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2013-3197
The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3196 and CVE-2013-3198.
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2018-9362
In processMessagePart of InboundSmsHandler.java, there is a possible remote denial of service due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-72298611.
[ "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2022-20763
Cisco Webex Meetings Java Deserialization Vulnerability
A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application.
[ "cpe:2.3:a:cisco:webex_meetings_online:wbs42.2.1-1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2024-4425
Storing credentials in plaintext in CemiPark
The access control in CemiPark software stores integration (e.g. FTP or SIP) credentials in plain-text. An attacker who gained unauthorized access to the device can retrieve clear text passwords used by the system.This issue affects CemiPark software: 4.5, 4.7, 5.03 and potentially others. The vendor refused to provide the specific range of affected products.
[ "cpe:2.3:a:cemi_tomasz_pawetek:cemipark:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-pp98-w696-5gp2
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
[]
null
null
null
null
null
GHSA-33f5-5f45-vcqg
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
[]
null
null
7.5
null
null
GHSA-5v3g-553g-mcmp
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the time parameter from saveParentControlInfo function.
[]
null
9.8
null
null
null
CVE-2023-21771
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7
null
null
null
GHSA-59m8-7pqx-q84q
Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors.
[]
null
null
null
null
null
CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:6.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.5
null
6
null
GHSA-x6jw-2f23-mc5j
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
[]
null
null
5.3
null
null
GHSA-pr9m-43p8-hjqg
The TwitRocker2 application before 1.0.23 for Android does not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
[]
null
null
null
null
null
CVE-2024-20459
Cisco ATA 190 Series Analog Telephone Adapter Muliplatform Firmware Command Injection Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system. This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
[ "cpe:2.3:o:cisco:ata_190_firmware:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.2.2_msr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:11.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_190_firmware:121.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*", "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*", "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*" ]
null
6.5
null
null
null
CVE-2024-37488
WordPress HelloAsso plugin <= 1.1.9 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HelloAsso allows Stored XSS.This issue affects HelloAsso: from n/a through 1.1.9.
[ "cpe:2.3:a:helloasso:helloasso:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
GHSA-mr2h-vgpg-wjv6
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.
[]
null
7.5
null
null
null
GHSA-p4vj-j2w3-773m
Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host.
[]
null
7.5
null
null
null
CVE-2024-1199
CodeAstro Employee Task Management System attendance-info.php denial of service
A vulnerability has been found in CodeAstro Employee Task Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file \employee-tasks-php\attendance-info.php. The manipulation of the argument aten_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252697 was assigned to this vulnerability.
[ "cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.4
5.4
5.5
null
CVE-2023-6863
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2008-2890
Multiple SQL injection vulnerabilities in Online Fantasy Football League (OFFL) 0.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) fflteam_id parameter to teams.php, the (2) league_id parameter to leagues.php, and the (3) player_id parameter to players.php.
[ "cpe:2.3:a:offl:online_fantasy_football_league:0.2.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-p4mr-3j7q-h6f9
Cross-site scripting (XSS) vulnerability in the Display Suite module 7.x-2.7 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to field display settings.
[]
null
null
null
null
null
CVE-2008-4122
Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
[ "cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-869h-w42g-4wxv
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI.
[]
null
null
null
null
null
RHSA-2024:1265
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 bug fix and security update
helm: getHostByName Function Information Disclosure
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.3
null
null
null
GHSA-wg2q-q9j3-c3v8
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
[]
null
8.8
null
null
null
GHSA-xqm3-prp6-x5jx
Cross-site scripting (XSS) vulnerability in the login audit form in McAfee Cloud Single Sign On (SSO) allows remote attackers to inject arbitrary web script or HTML via a crafted password.
[]
null
null
null
null
null
GHSA-4p64-mj95-v5fc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode Product Catalog Simple allows Stored XSS. This issue affects Product Catalog Simple: from n/a through 1.8.1.
[]
null
6.5
null
null
null
GHSA-qvq8-cw7f-m7m4
Apache JSPWiki vulnerable to cross-site scripting on several plugins
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
[]
null
6.1
null
null
null
GHSA-vmqv-j6xw-8vh4
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
[]
null
null
null
null
null
GHSA-397q-frxp-g3pm
Out of bound write issue is observed while giving information about properties that have been set so far for playing video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130
[]
null
null
null
null
null
CVE-2014-5663
The FreeCell Solitaire (aka com.mobilityware.freecell) application 2.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mobilityware:freecell_solitaire:2.1.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2022-26043
An external config control vulnerability exists in the OAS Engine SecureAddSecurity functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of a custom Security Group. An attacker can send a sequence of requests to trigger this vulnerability.
[ "cpe:2.3:a:openautomationsoftware:oas_platform:16.00.0112:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
RHSA-2018:2395
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: speculative bounds check bypass store kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.5
null
null
CVE-2025-32627
WordPress JS Job Manager plugin <= 2.0.2 - Local File Inclusion vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Job Manager allows PHP Local File Inclusion. This issue affects JS Job Manager: from n/a through 2.0.2.
[]
null
8.1
null
null
null
GHSA-wf9r-j7xh-v25m
Cross-site scripting (XSS) vulnerability in the Documents download (rtg_files) extension before 1.5.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-h24p-w6x4-wgf8
There is a Cross Site Scripting (XSS) vulnerability in SpotPage_login.php of Spotweb 1.5.1 and below, which allows remote attackers to inject arbitrary web script or HTML via the data[performredirect] parameter.
[]
null
6.1
null
null
null
CVE-2010-0106
The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.
[ "cpe:2.3:a:symantec:antivirus:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0:mr1:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0:mr2:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1:mr4:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1:mr5:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1:mr7:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
GHSA-6432-6x76-6778
GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges.
[]
null
9.8
null
null
null
RHSA-2015:2502
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_data_grid:6.4.1", "cpe:/a:redhat:jboss_data_grid:6.5.1" ]
null
null
null
null
null
GHSA-6cp2-5jr5-h85h
Cross-site request forgery (CSRF) vulnerability in pbx/gate in Brekeke PBX 2.4.4.8 allows remote attackers to hijack the authentication of users for requests that change passwords via the pbxadmin.web.PbxUserEdit bean.
[]
null
null
null
null
null
CVE-2008-5339
Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
[ "cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*" ]
null
null
null
5
null
PYSEC-2016-22
null
OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.
[]
null
null
null
null
null
CVE-2021-41565
Tad TadTools - Reflected XSS
TadTools special page parameter does not properly restrict the input of specific characters, thus remote attackers can inject JavaScript syntax without logging in, and further perform reflective XSS attacks.
[ "cpe:2.3:a:tadtools_project:tadtools:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2022-24627
An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is an unauthenticated SQL injection in the p parameter of the process_login.php login form.
[ "cpe:2.3:a:audiocodes:device_manager_express:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-gf4c-2362-w9fg
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka "Inappropriate Methods Exposed in XML Support Classes."
[]
null
null
null
null
null
GHSA-mmq8-6g35-x65g
Insufficient policy enforcement in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
[]
null
4.3
null
null
null
GHSA-vx87-6p5v-457g
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
[]
null
null
null
null
null
CVE-2007-5705
Unspecified vulnerability in the Settings component in the administration system in Jeebles Directory 2.9.60 allows remote authenticated administrators to execute arbitrary PHP code via unspecified vectors related to settings.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:jeeblestechnology:jeebles_directory:2.9.60:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2017-12784
In Youngzsoft CCFile (aka CC File Transfer) 3.6, by sending a crafted HTTP request, it is possible for a malicious user to remotely crash the affected software. No authentication is required. An example payload is a malformed request header with many '|' characters. NOTE: some sources use this ID for a NoviWare issue, but the correct ID for that issue is CVE-2017-12787.
[ "cpe:2.3:a:ccfile:cc_file_transfer:3.6:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-9v25-mc3c-w5v3
The Open Whisper Signal app before 2.23.2 for iOS allows physically proximate attackers to bypass the screen locker feature via certain rapid sequences of actions that include app opening, clicking on cancel, and using the home button.
[]
null
null
6.8
null
null
CVE-2022-42067
Online Birth Certificate Management System version 1.0 suffers from an Insecure Direct Object Reference (IDOR) vulnerability
[ "cpe:2.3:a:online_birth_certificate_management_system_project:online_birth_certificate_management_system:1.0:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-5qmp-w6rv-24wf
In the Linux kernel, the following vulnerability has been resolved:ax25: rcu protect dev->ax25_ptrsyzbot found a lockdep issue [1].We should remove ax25 RTNL dependency in ax25_setsockopt()This should also fix a variety of possible UAF in ax25.[1]WARNING: possible circular locking dependency detected 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not taintedsyz.5.1818/12806 is trying to acquire lock: ffffffff8fcb3988 (rtnl_mutex){+.+.}-{4:4}, at: ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680but task is already holding lock: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574which lock already depends on the new lock.the existing dependency chain (in reverse order) is:-> #1 (sk_lock-AF_AX25){+.+.}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 lock_sock_nested+0x48/0x100 net/core/sock.c:3642 lock_sock include/net/sock.h:1618 [inline] ax25_kill_by_device net/ax25/af_ax25.c:101 [inline] ax25_device_event+0x24d/0x580 net/ax25/af_ax25.c:146 notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85 __dev_notify_flags+0x207/0x400 dev_change_flags+0xf0/0x1a0 net/core/dev.c:9026 dev_ifsioc+0x7c8/0xe70 net/core/dev_ioctl.c:563 dev_ioctl+0x719/0x1340 net/core/dev_ioctl.c:820 sock_do_ioctl+0x240/0x460 net/socket.c:1234 sock_ioctl+0x626/0x8e0 net/socket.c:1339 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f-> #0 (rtnl_mutex){+.+.}-{4:4}: check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0x1ac/0xee0 kernel/locking/mutex.c:735 ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680 do_sock_setsockopt+0x3af/0x720 net/socket.c:2324 __sys_setsockopt net/socket.c:2349 [inline] __do_sys_setsockopt net/socket.c:2355 [inline] __se_sys_setsockopt net/socket.c:2352 [inline] __x64_sys_setsockopt+0x1ee/0x280 net/socket.c:2352 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7fother info that might help us debug this:Possible unsafe locking scenario:lock(sk_lock-AF_AX25); lock(rtnl_mutex); lock(sk_lock-AF_AX25); lock(rtnl_mutex);*** DEADLOCK ***1 lock held by syz.5.1818/12806: #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574stack backtrace: CPU: 1 UID: 0 PID: 12806 Comm: syz.5.1818 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2074 check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2206 check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/lockin ---truncated---
[]
null
7.8
null
null
null
GHSA-8x2f-w8fv-gqcm
A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface.This vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic&nbsp;that should have been blocked to a loopback interface on the device.
[]
null
5.3
null
null
null
CVE-2022-33910
An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.
[ "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-7m83-852c-hhv7
A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.
[]
null
4.6
null
null
null