id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-3phf-8x93-jmv2
|
A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.
|
[] | null | 6.1 | null | null | null |
|
CVE-2018-15763
|
PKS leaks IaaS Credentials to Application Logs
|
Pivotal Container Service, versions prior to 1.2.0, contains an information disclosure vulnerability which exposes IaaS credentials to application logs. A malicious user with access to application logs may be able to obtain IaaS credentials and perform actions using these credentials.
|
[
"cpe:2.3:a:pivotal_software:pivotal_container_service:*:*:*:*:*:*:*:*"
] | null | null | 9 | null | null |
RHSA-2018:0648
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null | null |
GHSA-mf76-jwrw-cxr8
|
A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.
|
[] | null | null | null | null | null |
|
GHSA-qg2r-g932-mwff
|
In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges and a Firmware compromise needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139424089
|
[] | null | null | null | null | null |
|
GHSA-jv5g-24q3-2ffw
|
SQL injection vulnerability in cn_users.php in CzarNews 1.20 and earlier allows remote attackers to execute arbitrary SQL commands via a recook cookie.
|
[] | null | null | null | null | null |
|
GHSA-vcpm-vcmc-m56v
|
A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. This affects an unknown part of the file /client/UnChkMailApplication.jsp. The manipulation of the argument typename leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-x5qv-3jp4-jf27
|
SQL injection vulnerability in ajax.php in Gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary SQL commands via the rsargs array parameter in an __exp__getFeedContent action.
|
[] | null | null | null | null | null |
|
GHSA-83cw-ph9g-5p57
|
The shortcodes-ultimate plugin before 5.0.1 for WordPress has remote code execution via a filter in a meta, post, or user shortcode.
|
[] | null | null | 9.8 | null | null |
|
GHSA-w6f7-5v79-v5cg
|
An untrusted search path vulnerability in testinitsigs.exe as used in Bitdefender Antivirus Free 2020 allows a low-privilege attacker to execute code as SYSTEM via a specially crafted DLL file.
|
[] | 8.8 | 7.8 | null | null | null |
|
GHSA-xx7x-j67h-66rj
|
The BulletProof Security WordPress plugin before 6.1 does not sanitize and escape some of its CAPTCHA settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
|
[] | null | 4.8 | null | null | null |
|
GHSA-68hx-hv9v-7v3w
|
In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the buffer was identified. Reported by Jason Geffner.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2013:1518
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB13-26) flash-plugin: multiple code execution flaws (APSB13-26)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
CVE-2023-45047
|
WordPress LeadSquared Suite Plugin <= 0.7.4 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in LeadSquared, Inc LeadSquared Suite plugin <= 0.7.4 versions.
|
[
"cpe:2.3:a:leadsquared:leadsquared_suite:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2022-47975
|
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-4j38-964f-658r
|
Zoho ManageEngine ADSelfService Plus through 6101 is vulnerable to unauthenticated Remote Code Execution while changing the password.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2011:1799
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
|
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
] | null | null | null | null | null |
GHSA-w67p-2pxq-7v84
|
The Rife Elementor Extensions & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Writing Effect Headline shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-7261
|
The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4)
and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1)
and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.
|
[
"cpe:2.3:o:zyxel:usg_lite_60ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1123acv3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax655e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wbe530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa110ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa110ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1123-ac_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1123-ac_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1123acv3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1123acv3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa130be_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa130be:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa210ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa210ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa220ax-6e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa220ax-6e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa50ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa50ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa50ax_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa50ax_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa55axe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa55axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa90ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa90ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa90ax_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa90ax_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_lite_60ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac500h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac6103d-i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac6103d-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac6502d-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac6502d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac6503d-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac6503d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac6552d-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac6552d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wac6553d-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wac6553d-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax300h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax510d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax510d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax610d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax610d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax620d-6e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax620d-6e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax630s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax630s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax640s-6e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax640s-6e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax650s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax650s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wax655e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wax655e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wbe530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wbe660s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wbe660s:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-2mjj-frg5-8m3j
|
ACDSee Free 1.1.21 has a User Mode Write AV starting at IDE_ACDStd!IEP_SetColorProfile+0x00000000000b9c2f.
|
[] | null | null | null | null | null |
|
GHSA-6mhg-333v-q39c
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
GHSA-hg68-w53w-phj5
|
Cross-site scripting (XSS) vulnerability in index.php in Nuked-Klan 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-v7gx-3c46-37v4
|
Cross-site request forgery (CSRF) vulnerability in DDSN Interactive cm3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions, allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2020-16101
|
It is possible for an unauthenticated remote DCOM websocket connection to crash the Command Centre service due to an out-of-bounds buffer access. Affected versions are v8.20 prior to v8.20.1166(MR3), v8.10 prior to v8.10.1211(MR5), v8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier.
|
[
"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.00.1228:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1211:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1166:-:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-2r2v-2jgp-6j72
|
index.php in PHP Links allows remote attackers to gain sensitive information via an invalid show parameter, which reveals the full path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-j72x-hrff-cm37
|
CMS Made Simple (CMSMS) 2.2.14 allows stored XSS via the Extensions > Fie Picker..
|
[] | null | null | null | null | null |
|
GHSA-7qrc-wm75-hvh3
|
Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.
|
[] | null | 7.5 | null | null | null |
|
GHSA-gpf3-4fw6-p76w
|
A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.
|
[] | null | 9.8 | null | null | null |
|
GHSA-c3qh-423w-97gw
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to read sensitive location information
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-46938
|
An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files.
|
[
"cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-65h5-996j-w6qc
|
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended access restrictions, and create administrative accounts or read data from arbitrary tenant domains, via a crafted URL, aka Bug IDs CSCus62671 and CSCus62652.
|
[] | null | null | null | null | null |
|
CVE-2023-4708
|
Infosoftbd Clcknshop GET Parameter all sql injection
|
A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /collection/all of the component GET Parameter Handler. The manipulation of the argument tag leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-238571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:infosoftbd:clcknshop:1.0.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-f7mm-6f83-q4xx
|
HiveOS through 0.6-102@191212 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-09-26, the vendor indicated that they would consider fixing this.
|
[] | null | 5.7 | null | null | null |
|
CVE-2024-4679
|
Folder Permission Vulnerability in JP1/Extensible SNMP Agent
|
Incorrect Default Permissions vulnerability in Hitachi JP1/Extensible SNMP Agent for Windows, Hitachi JP1/Extensible SNMP Agent on Windows, Hitachi Job Management Partner1/Extensible SNMP Agent on Windows allows File Manipulation.This issue affects JP1/Extensible SNMP Agent for Windows: from 12-00 before 12-00-01, from 11-00 through 11-00-*; JP1/Extensible SNMP Agent: from 10-10 through 10-10-01, from 10-00 through 10-00-02, from 09-00 through 09-00-04; Job Management Partner1/Extensible SNMP Agent: from 10-10 through 10-10-01, from 10-00 through 10-00-02, from 09-00 through 09-00-04.
|
[
"cpe:2.3:a:hitachi:jp1\\/extensible_snmp_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner1\\/extensible_snmp_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/extensible_snmp_agent:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | null | null |
CVE-2007-0382
|
Multiple SQL injection vulnerabilities in letterman.class.php in the Letterman 1.2.3 (com_letterman) component for Joomla! before 1.0.12 allow remote attackers to execute arbitrary SQL commands via the id parameter, related to the (1) lm_sendMail, (2) saveNewsletter, and (3) cancelNewsletter functions.
|
[
"cpe:2.3:a:letterman:letterman:1.2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-2044
|
Open redirect vulnerability in the Login Page (index.php) in ownCloud before 5.0.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter.
|
[
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-r24q-vj7p-78xf
|
Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20468.
|
[] | null | null | 3.3 | null | null |
|
CVE-2004-0103
|
crawl before 4.0.0 beta23 does not properly "apply a size check" when copying a certain environment variable, which may allow local users to gain privileges, possibly as a result of a buffer overflow.
|
[
"cpe:2.3:a:linley_henzell:crawl:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-2qfx-rcv3-25r2
|
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
|
[] | null | null | null | null | null |
|
CVE-2024-9431
|
Improper Privilege Management in transformeroptimus/superagi
|
In version v0.0.14 of transformeroptimus/superagi, there is an improper privilege management vulnerability. After logging into the system, users can change the passwords of other users, leading to potential account takeover.
|
[] | null | null | 6.5 | null | null |
GHSA-2g95-fmgh-m88h
|
Vulnerability in the Oracle iSupport component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[] | null | null | 8.2 | null | null |
|
GHSA-j7mh-fcjh-vp2q
|
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the News Menu component.
|
[] | null | 5.4 | null | null | null |
|
GHSA-499x-cvfw-94w6
|
uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-53024
|
NULL Pointer Dereference in Display
|
Memory corruption in display driver while detaching a device.
|
[] | null | 7.8 | null | null | null |
CVE-2024-9385
|
Themify Builder <= 7.6.2 - Reflected Cross-Site Scripting
|
The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
RHSA-2008:0038
|
Red Hat Security Advisory: postgresql security update
|
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2013-3197
|
The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3196 and CVE-2013-3198.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2018-9362
|
In processMessagePart of InboundSmsHandler.java, there is a possible remote denial of service due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-72298611.
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2022-20763
|
Cisco Webex Meetings Java Deserialization Vulnerability
|
A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application.
|
[
"cpe:2.3:a:cisco:webex_meetings_online:wbs42.2.1-1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2024-4425
|
Storing credentials in plaintext in CemiPark
|
The access control in CemiPark software stores integration (e.g. FTP or SIP) credentials in plain-text. An attacker who gained unauthorized access to the device can retrieve clear text passwords used by the system.This issue affects CemiPark software: 4.5, 4.7, 5.03 and potentially others. The vendor refused to provide the specific range of affected products.
|
[
"cpe:2.3:a:cemi_tomasz_pawetek:cemipark:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-pp98-w696-5gp2
|
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
|
[] | null | null | null | null | null |
|
GHSA-33f5-5f45-vcqg
|
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
|
[] | null | null | 7.5 | null | null |
|
GHSA-5v3g-553g-mcmp
|
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the time parameter from saveParentControlInfo function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-21771
|
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
|
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
GHSA-59m8-7pqx-q84q
|
Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-3682
|
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:6.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.5 | null | 6 | null |
|
GHSA-x6jw-2f23-mc5j
|
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
|
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
|
[] | null | null | 5.3 | null | null |
GHSA-pr9m-43p8-hjqg
|
The TwitRocker2 application before 1.0.23 for Android does not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
|
[] | null | null | null | null | null |
|
CVE-2024-20459
|
Cisco ATA 190 Series Analog Telephone Adapter Muliplatform Firmware Command Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.
This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
|
[
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.2_msr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:121.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
"cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2024-37488
|
WordPress HelloAsso plugin <= 1.1.9 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HelloAsso allows Stored XSS.This issue affects HelloAsso: from n/a through 1.1.9.
|
[
"cpe:2.3:a:helloasso:helloasso:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-mr2h-vgpg-wjv6
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.
|
[] | null | 7.5 | null | null | null |
|
GHSA-p4vj-j2w3-773m
|
Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-1199
|
CodeAstro Employee Task Management System attendance-info.php denial of service
|
A vulnerability has been found in CodeAstro Employee Task Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file \employee-tasks-php\attendance-info.php. The manipulation of the argument aten_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252697 was assigned to this vulnerability.
|
[
"cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | 5.4 | 5.5 | null |
CVE-2023-6863
|
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2008-2890
|
Multiple SQL injection vulnerabilities in Online Fantasy Football League (OFFL) 0.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) fflteam_id parameter to teams.php, the (2) league_id parameter to leagues.php, and the (3) player_id parameter to players.php.
|
[
"cpe:2.3:a:offl:online_fantasy_football_league:0.2.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-p4mr-3j7q-h6f9
|
Cross-site scripting (XSS) vulnerability in the Display Suite module 7.x-2.7 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to field display settings.
|
[] | null | null | null | null | null |
|
CVE-2008-4122
|
Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
|
[
"cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-869h-w42g-4wxv
|
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI.
|
[] | null | null | null | null | null |
|
RHSA-2024:1265
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 bug fix and security update
|
helm: getHostByName Function Information Disclosure
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null | null |
GHSA-wg2q-q9j3-c3v8
|
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
|
[] | null | 8.8 | null | null | null |
|
GHSA-xqm3-prp6-x5jx
|
Cross-site scripting (XSS) vulnerability in the login audit form in McAfee Cloud Single Sign On (SSO) allows remote attackers to inject arbitrary web script or HTML via a crafted password.
|
[] | null | null | null | null | null |
|
GHSA-4p64-mj95-v5fc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode Product Catalog Simple allows Stored XSS. This issue affects Product Catalog Simple: from n/a through 1.8.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-qvq8-cw7f-m7m4
|
Apache JSPWiki vulnerable to cross-site scripting on several plugins
|
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
|
[] | null | 6.1 | null | null | null |
GHSA-vmqv-j6xw-8vh4
|
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
|
[] | null | null | null | null | null |
|
GHSA-397q-frxp-g3pm
|
Out of bound write issue is observed while giving information about properties that have been set so far for playing video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130
|
[] | null | null | null | null | null |
|
CVE-2014-5663
|
The FreeCell Solitaire (aka com.mobilityware.freecell) application 2.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:mobilityware:freecell_solitaire:2.1.2:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2022-26043
|
An external config control vulnerability exists in the OAS Engine SecureAddSecurity functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of a custom Security Group. An attacker can send a sequence of requests to trigger this vulnerability.
|
[
"cpe:2.3:a:openautomationsoftware:oas_platform:16.00.0112:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2018:2395
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: speculative bounds check bypass store kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.5 | null | null |
CVE-2025-32627
|
WordPress JS Job Manager plugin <= 2.0.2 - Local File Inclusion vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Job Manager allows PHP Local File Inclusion. This issue affects JS Job Manager: from n/a through 2.0.2.
|
[] | null | 8.1 | null | null | null |
GHSA-wf9r-j7xh-v25m
|
Cross-site scripting (XSS) vulnerability in the Documents download (rtg_files) extension before 1.5.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-h24p-w6x4-wgf8
|
There is a Cross Site Scripting (XSS) vulnerability in SpotPage_login.php of Spotweb 1.5.1 and below, which allows remote attackers to inject arbitrary web script or HTML via the data[performredirect] parameter.
|
[] | null | 6.1 | null | null | null |
|
CVE-2010-0106
|
The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.
|
[
"cpe:2.3:a:symantec:antivirus:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0:mr1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0:mr2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1:mr4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1:mr5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1:mr7:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
GHSA-6432-6x76-6778
|
GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2015:2502
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_data_grid:6.4.1",
"cpe:/a:redhat:jboss_data_grid:6.5.1"
] | null | null | null | null | null |
GHSA-6cp2-5jr5-h85h
|
Cross-site request forgery (CSRF) vulnerability in pbx/gate in Brekeke PBX 2.4.4.8 allows remote attackers to hijack the authentication of users for requests that change passwords via the pbxadmin.web.PbxUserEdit bean.
|
[] | null | null | null | null | null |
|
CVE-2008-5339
|
Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
|
[
"cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
PYSEC-2016-22
| null |
OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.
|
[] | null | null | null | null | null |
CVE-2021-41565
|
Tad TadTools - Reflected XSS
|
TadTools special page parameter does not properly restrict the input of specific characters, thus remote attackers can inject JavaScript syntax without logging in, and further perform reflective XSS attacks.
|
[
"cpe:2.3:a:tadtools_project:tadtools:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2022-24627
|
An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is an unauthenticated SQL injection in the p parameter of the process_login.php login form.
|
[
"cpe:2.3:a:audiocodes:device_manager_express:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-gf4c-2362-w9fg
|
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka "Inappropriate Methods Exposed in XML Support Classes."
|
[] | null | null | null | null | null |
|
GHSA-mmq8-6g35-x65g
|
Insufficient policy enforcement in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
|
[] | null | 4.3 | null | null | null |
|
GHSA-vx87-6p5v-457g
|
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
|
[] | null | null | null | null | null |
|
CVE-2007-5705
|
Unspecified vulnerability in the Settings component in the administration system in Jeebles Directory 2.9.60 allows remote authenticated administrators to execute arbitrary PHP code via unspecified vectors related to settings.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:jeeblestechnology:jeebles_directory:2.9.60:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2017-12784
|
In Youngzsoft CCFile (aka CC File Transfer) 3.6, by sending a crafted HTTP request, it is possible for a malicious user to remotely crash the affected software. No authentication is required. An example payload is a malformed request header with many '|' characters. NOTE: some sources use this ID for a NoviWare issue, but the correct ID for that issue is CVE-2017-12787.
|
[
"cpe:2.3:a:ccfile:cc_file_transfer:3.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-9v25-mc3c-w5v3
|
The Open Whisper Signal app before 2.23.2 for iOS allows physically proximate attackers to bypass the screen locker feature via certain rapid sequences of actions that include app opening, clicking on cancel, and using the home button.
|
[] | null | null | 6.8 | null | null |
|
CVE-2022-42067
|
Online Birth Certificate Management System version 1.0 suffers from an Insecure Direct Object Reference (IDOR) vulnerability
|
[
"cpe:2.3:a:online_birth_certificate_management_system_project:online_birth_certificate_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-5qmp-w6rv-24wf
|
In the Linux kernel, the following vulnerability has been resolved:ax25: rcu protect dev->ax25_ptrsyzbot found a lockdep issue [1].We should remove ax25 RTNL dependency in ax25_setsockopt()This should also fix a variety of possible UAF in ax25.[1]WARNING: possible circular locking dependency detected
6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not taintedsyz.5.1818/12806 is trying to acquire lock:
ffffffff8fcb3988 (rtnl_mutex){+.+.}-{4:4}, at: ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680but task is already holding lock:
ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline]
ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574which lock already depends on the new lock.the existing dependency chain (in reverse order) is:-> #1 (sk_lock-AF_AX25){+.+.}-{0:0}:
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
lock_sock_nested+0x48/0x100 net/core/sock.c:3642
lock_sock include/net/sock.h:1618 [inline]
ax25_kill_by_device net/ax25/af_ax25.c:101 [inline]
ax25_device_event+0x24d/0x580 net/ax25/af_ax25.c:146
notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85
__dev_notify_flags+0x207/0x400
dev_change_flags+0xf0/0x1a0 net/core/dev.c:9026
dev_ifsioc+0x7c8/0xe70 net/core/dev_ioctl.c:563
dev_ioctl+0x719/0x1340 net/core/dev_ioctl.c:820
sock_do_ioctl+0x240/0x460 net/socket.c:1234
sock_ioctl+0x626/0x8e0 net/socket.c:1339
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:906 [inline]
__se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f-> #0 (rtnl_mutex){+.+.}-{4:4}:
check_prev_add kernel/locking/lockdep.c:3161 [inline]
check_prevs_add kernel/locking/lockdep.c:3280 [inline]
validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904
__lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x1ac/0xee0 kernel/locking/mutex.c:735
ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680
do_sock_setsockopt+0x3af/0x720 net/socket.c:2324
__sys_setsockopt net/socket.c:2349 [inline]
__do_sys_setsockopt net/socket.c:2355 [inline]
__se_sys_setsockopt net/socket.c:2352 [inline]
__x64_sys_setsockopt+0x1ee/0x280 net/socket.c:2352
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7fother info that might help us debug this:Possible unsafe locking scenario:lock(sk_lock-AF_AX25);
lock(rtnl_mutex);
lock(sk_lock-AF_AX25);
lock(rtnl_mutex);*** DEADLOCK ***1 lock held by syz.5.1818/12806:
#0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline]
#0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574stack backtrace:
CPU: 1 UID: 0 PID: 12806 Comm: syz.5.1818 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2074
check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2206
check_prev_add kernel/locking/lockdep.c:3161 [inline]
check_prevs_add kernel/lockin
---truncated---
|
[] | null | 7.8 | null | null | null |
|
GHSA-8x2f-w8fv-gqcm
|
A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface.This vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic that should have been blocked to a loopback interface on the device.
|
[] | null | 5.3 | null | null | null |
|
CVE-2022-33910
|
An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.
|
[
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-7m83-852c-hhv7
|
A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.
|
[] | null | 4.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.