id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-67rf-55wq-rpmf
|
AirPort Utility before 5.5.1 for Apple AirPort Base Station does not properly distribute MAC address ACLs to network extenders, which allows remote attackers to bypass intended access restrictions via an 802.11 authentication frame.
|
[] | null | null | null | null | null |
|
RHSA-2024:4527
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 8.8 | null | null | null |
CVE-2002-0171
|
IRISconsole 2.0 may allow users to log into the icadmin account with an incorrect password in some circumstances, which could allow users to gain privileges.
|
[
"cpe:2.3:a:sgi:irisconsole:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-52ph-jf97-p27x
|
Improper conditions check in firmware for Intel(R) Ethernet Adapters 800 Series Controllers and associated adapters before version 1.5.4.0 may allow a privileged user to potentially enable denial of service via local access.
|
[] | null | null | null | null | null |
|
CVE-2018-18276
|
XSS exists in the ProFiles 1.5 component for Joomla! via the name or path parameter when creating a new folder in the administrative panel.
|
[
"cpe:2.3:a:profiles_project:profiles:1.5:*:*:*:*:joomla\\!:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-vq59-jw46-8pm8
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x uses weak credential mechanism that could allow an attacker to easily calculate MQTT credentials.
|
[] | 8.7 | 7.5 | null | null | null |
|
GHSA-cqr9-3mc7-gvpr
|
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead.
|
[] | null | null | 7.8 | null | null |
|
CVE-2020-14974
|
The driver in IOBit Unlocker 1.1.2 allows a low-privileged user to unlock a file and kill processes (even ones running as SYSTEM) that hold a handle, via IOCTL code 0x222124.
|
[
"cpe:2.3:a:iobit:iobit_unlocker:1.1.2:*:*:*:*:*:*:*"
] | null | 7.1 | null | 6.6 | null |
|
CVE-2021-24239
|
Pie Register < 3.7.0.1 - Reflected Cross-Site Scripting (XSS)
|
The Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments WordPress plugin before 3.7.0.1 does not sanitise the invitaion_code GET parameter when outputting it in the Activation Code page, leading to a reflected Cross-Site Scripting issue.
|
[
"cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
GHSA-9hw9-68x2-c9mc
|
Iteris Vantage Velocity Field Unit 2.4.2 devices have multiple stored XSS issues in all parameters of the Start Data Viewer feature of the /cgi-bin/loaddata.py script.
|
[] | null | null | null | null | null |
|
GHSA-xmr2-c47x-rm4p
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in The Wikimedia Foundation Mediawiki - Mobile Frontend Extension allows Shared Resource Manipulation.This issue affects Mediawiki - Mobile Frontend Extension: from 1.39 through 1.43.
|
[] | 6.9 | null | null | null | null |
|
GHSA-cj3v-2vhf-wvcp
|
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. This affects the libhevc library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32873375.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-24614
|
WordPress Post Timeline Plugin <= 2.3.9 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in agileLogix Post Timeline allows Reflected XSS. This issue affects Post Timeline: from n/a through 2.3.9.
|
[] | null | 7.1 | null | null | null |
ICSA-21-280-05
|
InHand Networks IR615 Router (Update A)
|
The affected product 's management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router 's management portal and could lure the administrator to perform changes.CVE-2021-38472 has been assigned to this vulnerability. A CVSS v3 base score of 4.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). The vendor's cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.CVE-2021-38486 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). The affected product is vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router 's management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.CVE-2021-38480 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). The affected product has inadequate encryption strength, which may allow an attacker to intercept the communication and steal sensitive information or hijack the session.CVE-2021-38464 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). The affected product has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.CVE-2021-38474 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The affected product does not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.CVE-2021-38484 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). The affected product does not perform sufficient input validation on client requests from the help page. This may allow an attacker to perform a reflected cross-site scripting attack, which could allow an attacker to run code on behalf of the client browser.CVE-2021-38466 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L). The affected product is vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.CVE-2021-38470 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). The affected product is vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.CVE-2021-38478 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). The affected product 's website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.CVE-2021-38482 has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H). The affected product is vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.CVE-2021-38468 has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H). The affected product 's authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.CVE-2021-38476 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). The affected product does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.CVE-2021-38462 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
GHSA-277h-8wc5-7qfc
|
An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-23636
|
Invalid drop of partially-initialized instances in wasmtime
|
Wasmtime is an open source runtime for WebAssembly & WASI. Prior to versions 0.34.1 and 0.33.1, there exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an `externref` global will result in an invalid drop of a `VMExternRef` via an uninitialized pointer. A number of conditions listed in the GitHub Security Advisory must be true in order for an instance to be vulnerable to this issue. Maintainers believe that the effective impact of this bug is relatively small because the usage of `externref` is still uncommon and without a resource limiter configured on the `Store`, which is not the default configuration, it is only possible to trigger the bug from an error returned by `mprotect` or `VirtualAlloc`. Note that on Linux with the `uffd` feature enabled, it is only possible to trigger the bug from a resource limiter as the call to `mprotect` is skipped. The bug has been fixed in 0.34.1 and 0.33.1 and users are encouraged to upgrade as soon as possible. If it is not possible to upgrade to version 0.34.1 or 0.33.1 of the `wasmtime` crate, it is recommend that support for the reference types proposal be disabled by passing `false` to `Config::wasm_reference_types`. Doing so will prevent modules that use `externref` from being loaded entirely.
|
[
"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"cpe:2.3:a:bytecodealliance:wasmtime:0.34.0:*:*:*:*:rust:*:*"
] | null | 5.1 | null | null | null |
GHSA-474x-3vv5-5q3g
|
A Reflected Cross Site Scripting (XSS) vulnerability was found in /smsa/student_login.php in Kashipara Responsive School Management System v3.2.0, which allows remote attackers to execute arbitrary code via "error" parameter.
|
[] | null | 5.5 | null | null | null |
|
GHSA-56cm-rmmq-hqpv
|
In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.
|
[] | null | 3.1 | null | null | null |
|
CVE-2017-15116
|
The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
GHSA-wq2p-3hqr-x7qg
|
Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
|
[] | null | null | null | null | null |
|
GHSA-h8r8-mjq6-428c
|
An issue was discovered in Firmware Analysis and Comparison Tool v3.2. Logged in administrators could be targeted by a CSRF attack through visiting a crafted web page.
|
[] | null | 8.8 | null | null | null |
|
CVE-2009-1029
|
Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
|
[
"cpe:2.3:a:poppeeper:pop_peeper:*:*:*:*:*:*:*:*",
"cpe:2.3:a:poppeeper:pop_peeper:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppeeper:pop_peeper:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppeeper:pop_peeper:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-w6gm-jg83-rm6w
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10.
|
[] | null | 9.3 | null | null | null |
|
CVE-2017-11653
|
Razer Synapse 2.20.15.1104 and earlier uses weak permissions for the Devices directory, which allows local users to gain privileges via a Trojan horse (1) RazerConfigNative.dll or (2) RazerConfigNativeLOC.dll file.
|
[
"cpe:2.3:a:razer:synapse:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-cw5r-jx8r-9f7x
|
Jenkins Report Info Plugin Path Traversal vulnerability
|
Jenkins Report Info Plugin 1.2 and earlier does not perform path validation of the workspace directory while serving report files.Additionally, Report Info Plugin does not support distributed builds.This results in a path traversal vulnerability, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on the controller file system by editing the workspace path.As of publication of this advisory, there is no fix.
|
[] | 1.3 | 4.3 | null | null | null |
GHSA-jgvj-mgv6-79x3
|
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
|
[] | null | null | null | null | null |
|
GHSA-mf45-g8hg-p9g4
|
Cross-site scripting (XSS) vulnerability in the DisplayEntityField.getDescription method in ModelFormField.java in Apache OFBiz before 12.04.06 and 13.07.x before 13.07.03 allows remote attackers to inject arbitrary web script or HTML via the description attribute of a display-entity element.
|
[] | null | null | 6.1 | null | null |
|
GHSA-gr24-p6jg-5222
|
Multiple cross-site scripting (XSS) vulnerabilities in aMember allow remote attackers to inject arbitrary web script or HTML via the (1) lamember_login parameter to sendpass.php and (2) login parameter to member.php.
|
[] | null | null | null | null | null |
|
CVE-2006-5652
|
Cross-site scripting (XSS) vulnerability in Sun iPlanet Messaging Server Messenger Express allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated by setting the width style for an IMG element. NOTE: this issue might be related to CVE-2006-5486, however due to the vagueness of the initial advisory and different researchers, it has been assigned a new CVE.
|
[
"cpe:2.3:a:sun:iplanet_messaging_server_messenger_express:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-22818
|
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
|
[
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-48fh-jfr3-g6j5
|
IBM QRadar SIEM 7.3.0 through 7.3.3 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 166355.
|
[] | null | null | null | null | null |
|
GHSA-fm9h-pm3q-jpcr
|
180solutions Zango downloads "required Adware components" without checking integrity or authenticity, which might allow context-dependent attackers to execute arbitrary code by subverting the DNS resolution of static.zangocash.com.
|
[] | null | null | null | null | null |
|
GHSA-hr72-3p79-rchw
|
A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
|
[] | null | 5 | null | null | null |
|
GHSA-55hv-x43w-phcv
|
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
|
[] | null | null | 9.8 | null | null |
|
cisco-sa-asaftd-mgcp-SUqB8VKH
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device.
Cisco has released software updates that address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities.
This advisory is part of the May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 12 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73830"].
|
[] | null | null | 8.6 | null | null |
GHSA-pmrj-fmr8-qr7m
|
A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to access the remote support account even after it has been disabled via the web application. The vulnerability is due to a design flaw in Cisco WebEx Meetings Server, which would not disable access to specifically configured user accounts, even after access had been disabled in the web application. An attacker could exploit this vulnerability by connecting to the remote support account, even after it had been disabled at the web application level. An exploit could allow the attacker to modify server configuration and gain access to customer data. Cisco Bug IDs: CSCvg46741.
|
[] | null | null | 8.1 | null | null |
|
CVE-2021-22851
|
HGiga OAKloud Portal - SQL injection -1
|
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (document management page) to obtain database schema and data.
|
[
"cpe:2.3:a:hgiga:oaklouds_openid:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2024-4524
|
Campcodes Complete Web-Based School Management System student_payment_invoice.php cross site scripting
|
A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/student_payment_invoice.php. The manipulation of the argument desc leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263127.
|
[] | null | 3.5 | 3.5 | 4 | null |
GHSA-rc5q-3pm2-x989
|
An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-27612
|
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.
|
[
"cpe:2.3:a:synology:audio_station:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
CVE-2021-20662
|
Missing authentication for critical function in SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an attacker to alter the setting information without the access privileges via unspecified vectors.
|
[
"cpe:2.3:o:contec:sv-cpt-mc310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:contec:sv-cpt-mc310:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2016:0497
|
Red Hat Security Advisory: git19-git security update
|
git: path_name() integer truncation and overflow leading to buffer overflow git: path_name() integer truncation and overflow leading to buffer overflow
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null | null |
GHSA-45hj-x6v8-2mjc
|
A SQL Injection issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4.
|
[] | null | null | 9.8 | null | null |
|
GHSA-7chh-4jrv-mcjf
|
Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2) baseman.dll, (3) wintab32.dll, or (4) wintab.dll file in the current working directory, as demonstrated by a directory that contains a .hln or .rdl file. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2016-8817
|
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.
|
[
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2012-4549
|
The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods.
|
[
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.2:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
RHSA-2009:1339
|
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
|
rgmanager: multiple insecure temporary file use issues
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null | null |
GHSA-hj2r-678g-rxmg
|
Memory corruption while handling multiple IOCTL calls from userspace to operate DMA operations.
|
[] | null | 6.6 | null | null | null |
|
GHSA-2cww-cxmg-44cc
|
Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments.
|
[] | null | null | null | null | null |
|
CVE-2022-36112
|
Blind Server-Side Request Forgery (SSRF) in GLPI
|
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. There are no known workarounds.
|
[
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
GHSA-j4xv-vq4c-x7jr
|
An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file.
|
[] | null | 7.1 | null | null | null |
|
CVE-2008-2686
|
webinc/bxe/scripts/loadsave.php in Flux CMS 1.5.0 and earlier allows remote attackers to execute arbitrary code by overwriting a PHP file in webinc/bxe/scripts/ via a filename in the XML parameter and PHP sequences in the request body, then making a direct request for this filename.
|
[
"cpe:2.3:a:flux_cms:flux_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.31:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2010-4725
|
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:smarty:smarty:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-8mcx-cfxm-5pmr
|
Xtreme Topsites 1.1 allows remote attackers to trigger MySQL errors and possibly conduct SQL injection attacks via unspecified vectors in join.php.
|
[] | null | null | null | null | null |
|
CVE-2004-0764
|
Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2013-3146
|
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
|
[
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-vj9v-mpvg-69mv
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | null | null | null |
|
GHSA-67w9-6p7h-rc7m
|
A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2019:4326
|
Red Hat Security Advisory: fribidi security update
|
fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null | null |
GHSA-gjpq-v684-hwg5
|
A directory listing vulnerability in Best Student Result Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
|
[] | null | 7.5 | null | null | null |
|
GHSA-8h8p-rqmp-jwwq
|
Out of bound memory access while processing qpay due to not validating length of the response buffer provided by User. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8098, MSM8909, MSM8998, SDA660, SDA845, SDM630, SDM636, SDM660, SDM845
|
[] | null | null | null | null | null |
|
RHSA-2021:0739
|
Red Hat Security Advisory: nodejs:12 security update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null | null |
GHSA-9v88-5pgx-3c5q
|
Cross Site Scripting vulnerabiltiy in Badaso v.0.0.1 thru v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the rack number parameter in the add new rack function.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-12228
|
PHPGurukul Complaint Management System user-search.php sql injection
|
A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-hgvm-hcc2-jv5c
|
Use after free in Browser Switcher in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-11287
|
Ebook Store <= 5.8001 - Reflected Cross-Site Scripting
|
The Ebook Store plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.8001. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2022-44746
|
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.
|
[
"cpe:2.3:a:acronis:cyber_protect_home_office:*:*:*:*:*:windows:*:*"
] | null | null | 2.2 | null | null |
|
CVE-2024-53162
|
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
|
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
The fw_objs[] array has "num_objs" elements so the > needs to be >= to
prevent an out of bounds read.
|
[] | null | 7.1 | null | null | null |
GHSA-vcr6-vwcj-r3r3
|
The Tracking Code Manager WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8 | null | null | null |
|
CVE-2023-22462
|
Stored XSS in Grafana Text plugin
|
Grafana is an open-source platform for monitoring and observability. On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin "Text". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database. An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. Another user needs to edit the same Text panel, and click on "Markdown" or "HTML" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. This issue has been patched in versions 9.2.10 and 9.3.4.
|
[
"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null | null |
CVE-2014-7419
|
The PokeCreator Lite (aka com.pokecreator.builderlite) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:pokecreator:pokecreator_lite:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2016-8869
|
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-93h2-hj2q-42gj
|
In JForum 2.1.8, an unauthenticated, remote attacker can enumerate whether a user exists by using the "create user" function. If a register/check/username?username= request corresponds to a username that exists, then an "is already in use" error is produced. NOTE: this product is discontinued.
|
[] | null | null | 5.3 | null | null |
|
GHSA-2p69-hxpm-h4q5
|
A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | 7.4 | 8.8 | null | null | null |
|
GHSA-mrv5-8qm5-5cmw
|
Multiple cross-site scripting (XSS) vulnerabilities in Claroline before 1.11.9 allow remote attackers to inject arbitrary web script or HTML via the (1) box parameter to messaging/messagebox.php, cidToEdit parameter to (2) adminregisteruser.php or (3) admin_user_course_settings.php in admin/, (4) module_id parameter to admin/module/module.php, or (5) offset parameter to admin/right/profile_list.php.
|
[] | null | null | null | null | null |
|
GHSA-96pw-fjxr-jpjc
|
Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed description, which leads to memory corruption.
|
[] | null | null | null | null | null |
|
GHSA-q72f-m8rg-wc5r
|
Unity before 7.2.1, as used in Ubuntu 14.04, does not properly restrict access to the Dash when the lock screen is active, which allows physically proximate attackers to bypass the lock screen and execute arbitrary commands, as demonstrated by pressing the SUPER key before the screen auto-locks.
|
[] | null | null | null | null | null |
|
GHSA-g6f3-67v4-98vv
|
An issue in Plug n Play Camera com.wisdomcity.zwave 1.1.0 allows a remote attacker to obtain sensitive information via the firmware update process.
|
[] | null | 8.2 | null | null | null |
|
GHSA-x7hm-jh97-58mq
|
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-7592
|
A vulnerability has been identified in SIMATIC HMI Basic Panels 1st Generation (incl. SIPLUS variants) (All versions), SIMATIC HMI Basic Panels 2nd Generation (incl. SIPLUS variants) (All versions), SIMATIC HMI Comfort Panels (incl. SIPLUS variants) (All versions), SIMATIC HMI KTP700F Mobile Arctic (All versions), SIMATIC HMI Mobile Panels 2nd Generation (All versions), SIMATIC WinCC Runtime Advanced (All versions). Unencrypted communication between the configuration software and the respective device could allow an attacker to capture potential plain text communication and have access to sensitive information.
|
[
"cpe:2.3:a:siemens:simatic_hmi_basic_panels_1st_generation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_basic_panels_2nd_generation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp700f_mobile_arctic_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp700f_mobile_arctic:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_mobile_panels_2nd_generation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_mobile_panels_2nd_generation:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
GHSA-c8mp-x54x-hcww
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x617087.
|
[] | null | 6.5 | null | null | null |
|
CVE-2017-0357
|
iucode-tool: heap buffer overflow on -tr loader
|
A heap-overflow flaw exists in the -tr loader of iucode-tool starting with v1.4 and before v2.1.1, potentially leading to SIGSEGV, or heap corruption.
|
[
"cpe:2.3:a:iucode-tool_project:iucode-tool:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
RHSA-2024:0310
|
Red Hat Security Advisory: openssl security update
|
openssl: Incorrect cipher key and IV length processing
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null | null |
GHSA-6jvx-8ch9-j2jr
|
Laravel Cookie serialization vulnerability
|
Laravel 5.6.30 is a security release of Laravel and is recommended as an immediate upgrade for all users. Laravel 5.6.30 also contains a breaking change to cookie encryption and serialization logic. Refer to [laravel advisory](https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30) for more details and read the notes carefully when upgrading your application.
|
[] | null | null | null | null | null |
CVE-2019-10171
|
It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was incorrectly applied in RHEL 7.5. An attacker would still be able to provoke excessive CPU consumption leading to a denial of service.
|
[
"cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2024-48859
|
QTS, QuTS hero
|
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
|
[
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*"
] | 5.3 | null | null | null | null |
GHSA-37qc-9cjf-ffmp
|
Stack-based buffer overflow in Orbit downloader 2.6.3 and 2.6.4 allows remote attackers to execute arbitrary code via a long download URL, which is not properly handled during Unicode conversion for a balloon notification after a download has failed.
|
[] | null | null | null | null | null |
|
CVE-2021-1337
|
Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
|
[
"cpe:2.3:o:cisco:rv016_multi-wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016_multi-wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042_dual_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082_dual_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
GHSA-hrr3-cwf8-mjp6
|
In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
|
[] | null | 8.6 | null | null | null |
|
GHSA-h89c-vcfj-gg33
|
Adobe AIR SDK & Compiler before 23.0.0.257 on Windows does not support Android runtime-analytics transport security, which might allow remote attackers to obtain sensitive information by leveraging access to a network over which analytics data is sent.
|
[] | null | null | 7.5 | null | null |
|
GHSA-7mqq-22j6-frjr
|
The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including, 16.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to add custom fields that can be updated and then use the check_and_overwrite_wp_or_woocommerce_fields function to update the wp_capabilities field to have administrator privileges.
|
[] | null | 8.8 | null | null | null |
|
GHSA-82vf-v55v-59x5
|
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291.
|
[] | null | null | null | null | null |
|
GHSA-689w-78jv-m8qf
|
PingCentral versions prior to listed versions expose Spring Boot actuator endpoints that with administrative authentication return large amounts of sensitive environmental and application information.
|
[] | null | 4.9 | null | null | null |
|
CVE-2023-32468
|
Dell ECS Streamer, versions prior to 2.0.7.1, contain an insertion of sensitive information in log files vulnerability. A remote malicious high-privileged user could potentially exploit this vulnerability leading to exposure of this sensitive data.
|
[
"cpe:2.3:a:dell:ecs_streamer:*:*:*:*:*:*:*:*"
] | null | 5.8 | null | null | null |
|
GHSA-mchr-xvw2-q64f
|
Missing Authorization vulnerability in RomanCode MapSVG allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects MapSVG: from n/a through 8.5.31.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2021:2932
|
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
|
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-normalize-url: ReDoS for data URLs
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | 5.3 | null | null |
CVE-2024-42030
|
Access permission verification vulnerability in the content sharing pop-up module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
|
[
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
|
GHSA-c6q9-x9fp-xmc6
|
There is an Uncontrolled resource consumption vulnerability in the display module in smartphones. Successful exploitation of this vulnerability may affect service integrity.
|
[] | null | 9.1 | null | null | null |
|
CVE-2018-13604
|
The mintToken function of a smart contract implementation for wellieat, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:wellieat_project:wellieat:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-63qj-x5v8-6jj4
|
In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.