id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-5154
|
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2005-3176
|
Microsoft Windows 2000 before Update Rollup 1 for SP4 does not record the IP address of a Windows Terminal Services client in a security log event if the client connects successfully, which could make it easier for attackers to escape detection.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-49253
|
WordPress Lasa <= 1.1 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Lasa allows PHP Local File Inclusion. This issue affects Lasa: from n/a through 1.1.
|
[] | null | 8.1 | null | null | null |
GHSA-fg2w-r2w5-mgjw
|
In the Linux kernel, the following vulnerability has been resolved:HID: i2c-hid-of: fix NULL-deref on failed power upA while back the I2C HID implementation was split in an ACPI and OF
part, but the new OF driver never initialises the client pointer which
is dereferenced on power-up failures.
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-23878
|
pdf2json v0.71 was discovered to contain a stack buffer overflow in the component XRef::fetch.
|
[
"cpe:2.3:a:flowpaper:pdf2json:0.71:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2019-12617
|
In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution.
|
[
"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*"
] | null | 2.7 | null | 4 | null |
|
GHSA-69r7-7qx9-rhm7
|
Weak Authentication vulnerability in Guido VS Contact Form allows Authentication Abuse.This issue affects VS Contact Form: from n/a through 14.0.
|
[] | null | 5.3 | null | null | null |
|
CVE-2016-9209
|
A vulnerability in TCP processing in Cisco FirePOWER system software could allow an unauthenticated, remote attacker to download files that would normally be blocked. Affected Products: The following Cisco products are vulnerable: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Advanced Malware Protection (AMP) for Networks - 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks - 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers (ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire 3D System Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. More Information: CSCvb20102. Known Affected Releases: 2.9.7.10.
|
[
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:5.4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_services_for_adaptive_security_appliance:6.1.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 | null |
|
CVE-2024-52879
|
An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, SmmUpdateVariablePropertySmi () is a SMM callback function and it uses StrCmp () to compare variable names. This action may cause a buffer over-read.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-38330
|
Yet Another bol.com Plugin <= 1.4 Reflected Cross-Site Scripting
|
The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.
|
[
"cpe:2.3:a:tromit:yabp:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2016-4630
|
ImageIO in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted EXR image with B44 compression.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-43090
|
Gnome-shell: screenshot tool allows viewing open windows when session is locked
|
A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.
|
[
"cpe:2.3:a:gnome:gnome-shell:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gnome-shell:42:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-68ww-7h9f-48qx
|
The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in check_data_integrity function. This function is responsible for validating the checksum of data in post request. The checksum is sent encrypted in the request, the function decrypts it and stores the checksum on the stack without validating it. An unauthenticated attacker can get RCE as root by exploiting this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-25214
|
A race condition vulnerability exists in the aVideoEncoder.json.php unzip functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A series of specially crafted HTTP request can lead to arbitrary code execution.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-45788
|
TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the comment parameter in setMacFilterRules.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-31536
|
WordPress CF7 Spreadsheets plugin <= 2.3.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in moshensky CF7 Spreadsheets allows Reflected XSS. This issue affects CF7 Spreadsheets: from n/a through 2.3.2.
|
[] | null | 7.1 | null | null | null |
GHSA-jcq4-2h83-w49h
|
enter.asp in Mini-Nuke 2.3 and earlier makes it easier for remote attackers to conduct password guessing attacks by setting the guvenlik parameter to the same value as the hidden gguvenlik parameter, which bypasses a verification step because the gguvenlik parameter is assumed to be immutable by the attacker.
|
[] | null | null | null | null | null |
|
GHSA-gvc8-8jhg-7556
|
Cross Site Request Forgery vulnerability in LifestyleStore v.1.0 allows a remote attacker to execute arbitrary cod and obtain sensitive information.
|
[] | null | 8.1 | null | null | null |
|
GHSA-c244-p864-46qg
|
Interaction error in xdg-open allows remote attackers to execute arbitrary code by sending a file with a dangerous MIME type but using a safe type that Firefox sends to xdg-open, which causes xdg-open to process the dangerous file type through automatic type detection, as demonstrated by overwriting the .desktop file.
|
[] | null | null | null | null | null |
|
CVE-2025-7536
|
Campcodes Sales and Inventory System receipt_credit.php sql injection
|
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /pages/receipt_credit.php. The manipulation of the argument sid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-rq38-43xh-2f3p
|
A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to cause the affected software to terminate or to gain access to memory state information that is related to the vulnerable application. The vulnerability is due to insufficient validation of values in Webex recording files that are stored in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a malicious WRF file to a user as a link or email attachment and then persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to crash the affected software and view memory state information.
|
[] | null | null | null | null | null |
|
CVE-2025-7221
|
GiveWP – Donation Plugin and Fundraising Platform <= 4.5.0 - Missing Authorization to Donation Update
|
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.
|
[] | null | 4.3 | null | null | null |
ICSA-21-189-02
|
MDT AutoSave
|
An attacker could decipher the encryption and gain access to the system.CVE-2021-32945 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). An attacker could utilize SQL commands to create a new user in the system and update the user 's permissions, granting the attacker the ability to login.CVE-2021-32953 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An attacker could utilize a function that permits changing a designated path to another path and traversing the directory, allowing the replacement of an existing file with a malicious file.CVE-2021-32949 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line and run a command line argument. This could then be leveraged to run a malicious process.CVE-2021-32933 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). A function is used to retrieve system information for a specific process, and this information collection executes multiple commands and summarizes the information into an XML. This function and subsequent process gives full path to the executable and is therefore vulnerable to binary hijacking.CVE-2021-32957 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used. An attacker can leverage this knowledge to provide a malicious command to the working directory where the read and write activity can be initiated.CVE-2021-32937 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A getfile function enables a user to supply an optional parameter, resulting in the processing of a request in a special manner. This can result in the execution of an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.CVE-2021-32961 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
|
[] | null | null | 7.5 | null | null |
CVE-2011-2218
|
Unspecified vulnerability in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors, a different vulnerability than CVE-2011-2219.
|
[
"cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:8.0:hp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:8.0:hp2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-49272
|
WordPress Social Auto Poster plugin <= 5.3.15 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in WPWeb Social Auto Poster allows Cross Site Request Forgery.This issue affects Social Auto Poster: from n/a through 5.3.15.
|
[
"cpe:2.3:a:wpwebinfotech:social_auto_poster:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-354c-5qgc-43h7
|
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[] | null | 5.5 | null | null | null |
|
GHSA-mrv2-vg67-g8pw
|
edx-platform before 2018-07-18 allows XSS via a response to a Chemical Equation advanced problem.
|
[] | null | 6.1 | null | null | null |
|
GHSA-3qqg-5x4c-6frh
|
MercuryBoard 1.1.1 allows remote attackers to gain sensitive information via an HTTP request with the n parameter set to 0, which causes a divide-by-zero error and reveals the path in the resulting error message.
|
[] | null | null | null | null | null |
|
GHSA-mcfm-j6mc-82gv
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
RHSA-2024:1037
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.36 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null | null |
CVE-2024-24450
|
Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.
|
[] | null | 5.3 | null | null | null |
|
CVE-2018-4989
|
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2022-41699
|
Incorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-4wmf-hjw4-gmv3
|
The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
GHSA-9r43-p7wr-7396
|
In the Linux kernel, the following vulnerability has been resolved:dlm: fix dlm_recover_members refcount on errorIf dlm_recover_members() fails we don't drop the references of the
previous created root_list that holds and keep all rsbs alive during the
recovery. It might be not an unlikely event because ping_members() could
run into an -EINTR if another recovery progress was triggered again.
|
[] | null | 5.5 | null | null | null |
|
GHSA-23xj-w5qm-57j6
|
Untrusted search path vulnerability in Installer of HIBUN Confidential File Viewer prior to 11.20.0001 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-54617
|
Stack-based buffer overflow vulnerability in the dms_fwk module.
Impact: Successful exploitation of this vulnerability can cause RCE.
|
[] | null | 6.8 | null | null | null |
|
cisco-sa-asaftd-rsa-key-leak-Ms7UEfZz
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability
|
A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key.
This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key.
The following conditions may be observed on an affected device:
This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key.
The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise ["#ic"] section for more information on the detection of this type of RSA key.
The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 7.4 | null | null | null |
GHSA-vqh2-672q-h5xp
|
An exploitable code execution vulnerability exists in the rendering functionality of Nitro Pro 13.13.2.242 and 13.16.2.300. When drawing the contents of a page and selecting the stroke color from an 'ICCBased' colorspace, the application will read a length from the file and use it as a loop sentinel when writing data into the member of an object. Due to the object member being a buffer of a static size allocated on the heap, this can result in a heap-based buffer overflow. A specially crafted document must be loaded by a victim in order to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
GHSA-9pjc-88j6-6ww4
|
Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.40), 8.4 before 8.4(7.9), 8.6 before 8.6(1.13), 9.0 before 9.0(4.1), and 9.1 before 9.1(4.3) does not properly process management-session information during privilege validation for SSL VPN portal connections, which allows remote authenticated users to gain privileges by establishing a Clientless SSL VPN session and entering crafted URLs, aka Bug ID CSCul70099.
|
[] | null | null | null | null | null |
|
GHSA-xwq2-3qq4-3p6h
|
Heap-based buffer overflow in pskcmp.dll in Panda Software Antivirus library allows remote attackers to execute arbitrary code via a crafted ZOO archive.
|
[] | null | null | null | null | null |
|
CVE-2017-6612
|
A vulnerability in the gateway GPRS support node (GGSN) of Cisco ASR 5000 Series Aggregation Services Routers 17.3.9.62033 through 21.1.2 could allow an unauthenticated, remote attacker to redirect HTTP traffic sent to an affected device. More Information: CSCvc67927.
|
[
"cpe:2.3:a:cisco:asr_5000_series_software:17.3.9.62033:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:17.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:19.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.1.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 | null |
|
CVE-2019-2551
|
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: Print Server). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:e-business_suite:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.8:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 | null |
|
CVE-2018-7322
|
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-wq8w-m2g8-mv57
|
PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-4392
|
dnscache in Daniel J. Bernstein djbdns 1.05 does not prevent simultaneous identical outbound DNS queries, which makes it easier for remote attackers to spoof DNS responses, as demonstrated by a spoofed A record in the Additional section of a response to a Start of Authority (SOA) query.
|
[
"cpe:2.3:a:d.j.bernstein:djbdns:1.05:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
RHSA-2023:2502
|
Red Hat Security Advisory: dhcp security and enhancement update
|
dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort dhcp: DHCP memory leak
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null | null |
GHSA-h8w3-m7vj-q5mc
|
The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
|
[] | null | null | null | null | null |
|
GHSA-2cfx-8j9j-pg36
|
In telephony, there is a possible permission bypass due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319132; Issue ID: ALPS07319132.
|
[] | null | 7.8 | null | null | null |
|
CVE-2011-4503
|
The UPnP IGD implementation in Broadcom Linux on the Sitecom WL-111 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.
|
[
"cpe:2.3:o:broadcom:broadcom_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sitecom:wl-111:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-28494
|
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, authentication is bypassed by unprivileged users who are accessing the Web UI. This issue affects: Arista Metamako Operating System MOS-0.34.0 and prior releases
|
[
"cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
|
GHSA-mf78-mcx4-9ph4
|
Cross-site scripting (XSS) vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter.
|
[] | null | null | null | null | null |
|
GHSA-m23j-mxgf-384m
|
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to execute arbitrary code with kernel privileges
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-36247
|
Open OnDemand before 1.5.7 and 1.6.x before 1.6.22 allows CSRF.
|
[
"cpe:2.3:a:osc:open_ondemand:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-hgg9-39pm-hm6w
|
Format string vulnerability in ProZilla 1.3.7.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the Location header.
|
[] | null | null | null | null | null |
|
GHSA-mhmm-m867-5r8p
|
LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.
|
[] | null | null | 8.8 | null | null |
|
GHSA-93cr-637p-8r5m
|
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32526.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-4062
|
Hualai Xiaofang iSC5 certificate validation
|
A vulnerability was found in Hualai Xiaofang iSC5 3.2.2_112 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper certificate validation. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of this vulnerability is VDB-261788. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:hualai:isc5:3.2.2_112:*:*:*:*:*:*:*"
] | null | 3.7 | 3.7 | 2.6 | null |
GHSA-cfhg-9x44-78h2
|
ps Enables OS Command Injection
|
Versions of `ps` before 1.0.0 are vulnerable to command injection.Proof of concept:RecommendationUpdate to version 1.0.0 or later.
|
[] | null | null | 9.8 | null | null |
GHSA-w93c-g8jh-q2hx
|
Microsoft Internet Information Services (IIS) 5.0 and 5.1 allows remote attackers to cause a denial of service via a long WebDAV request with a (1) PROPFIND or (2) SEARCH method, which generates an error condition that is not properly handled.
|
[] | null | null | null | null | null |
|
CVE-2019-4193
|
IBM Jazz for Service Management 1.1.3 and 1.1.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-force ID: 159032.
|
[
"cpe:2.3:a:ibm:jazz_for_service_management:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
CVE-2018-4248
|
An out-of-bounds read was addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, macOS High Sierra 10.13.6, tvOS 11.4.1, watchOS 4.3.2.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-6f8c-2h4w-727p
|
Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the systemSettings.php component.
|
[] | null | 6.1 | null | null | null |
|
GHSA-qvg3-jj6j-c973
|
ALF-BanCO v8.2.5 and below was discovered to use a hardcoded password to encrypt the SQLite database containing the user's data. Attackers who are able to gain remote or local access to the system are able to read and modify the data.
|
[] | null | 9.1 | null | null | null |
|
CVE-2021-30915
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A person with physical access to an iOS device may be able to determine characteristics of a user's password in a secure text entry field.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | 2.1 | null |
|
GHSA-9jg3-ffw3-vq2f
|
SQL injection vulnerability in admin.php in MRCGIGUY The Ticket System 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a viewticket action.
|
[] | null | null | null | null | null |
|
CVE-2006-3453
|
Buffer overflow in Adobe Acrobat 6.0 to 6.0.4 allows remote attackers to execute arbitrary code via unknown vectors in a document that triggers the overflow when it is distilled to PDF.
|
[
"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2011-4907
|
Joomla! 1.5x through 1.5.12: Missing JEXEC Check
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-p6gg-7f5v-7fh8
|
** DISPUTED ** In Z-BlogPHP 1.5.1.1740, there is Web Site physical path leakage, as demonstrated by admin_footer.php or admin_footer.php. NOTE: the software maintainer disputes that this is a vulnerability.
|
[] | null | null | 5.3 | null | null |
|
RHSA-2024:7851
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null | null |
GHSA-7qpp-mq9c-7449
|
If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
|
[] | null | 9.6 | null | null | null |
|
GHSA-r7p6-cff4-g6q4
|
In the Linux kernel, the following vulnerability has been resolved:stmmac: Clear variable when destroying workqueueCurrently when suspending driver and stopping workqueue it is checked whether
workqueue is not NULL and if so, it is destroyed.
Function destroy_workqueue() does drain queue and does clear variable, but
it does not set workqueue variable to NULL. This can cause kernel/module
panic if code attempts to clear workqueue that was not initialized.This scenario is possible when resuming suspended driver in stmmac_resume(),
because there is no handling for failed stmmac_hw_setup(),
which can fail and return if DMA engine has failed to initialize,
and workqueue is initialized after DMA engine.
Should DMA engine fail to initialize, resume will proceed normally,
but interface won't work and TX queue will eventually timeout,
causing 'Reset adapter' error.
This then does destroy workqueue during reset process.
And since workqueue is initialized after DMA engine and can be skipped,
it will cause kernel/module panic.To secure against this possible crash, set workqueue variable to NULL when
destroying workqueue.Log/backtrace from crash goes as follows:
[88.031977]------------[ cut here ]------------
[88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out
[88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398
<Skipping backtrace for watchdog timeout>
[88.032251]---[ end trace e70de432e4d5c2c0 ]---
[88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.
[88.036359]------------[ cut here ]------------
[88.036519]Call trace:
[88.036523] flush_workqueue+0x3e4/0x430
[88.036528] drain_workqueue+0xc4/0x160
[88.036533] destroy_workqueue+0x40/0x270
[88.036537] stmmac_fpe_stop_wq+0x4c/0x70
[88.036541] stmmac_release+0x278/0x280
[88.036546] __dev_close_many+0xcc/0x158
[88.036551] dev_close_many+0xbc/0x190
[88.036555] dev_close.part.0+0x70/0xc0
[88.036560] dev_close+0x24/0x30
[88.036564] stmmac_service_task+0x110/0x140
[88.036569] process_one_work+0x1d8/0x4a0
[88.036573] worker_thread+0x54/0x408
[88.036578] kthread+0x164/0x170
[88.036583] ret_from_fork+0x10/0x20
[88.036588]---[ end trace e70de432e4d5c2c1 ]---
[88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
|
[] | null | null | null | null | null |
|
CVE-2022-21675
|
Bytecode Viewer v2.10.x Zip Slip
|
Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.
|
[
"cpe:2.3:a:bytecode_viewer_project:bytecode_viewer:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null | null |
CVE-2024-43856
|
dma: fix call order in dmam_free_coherent
|
In the Linux kernel, the following vulnerability has been resolved:
dma: fix call order in dmam_free_coherent
dmam_free_coherent() frees a DMA allocation, which makes the
freed vaddr available for reuse, then calls devres_destroy()
to remove and free the data structure used to track the DMA
allocation. Between the two calls, it is possible for a
concurrent task to make an allocation with the same vaddr
and add it to the devres list.
If this happens, there will be two entries in the devres list
with the same vaddr and devres_destroy() can free the wrong
entry, triggering the WARN_ON() in dmam_match.
Fix by destroying the devres entry before freeing the DMA
allocation.
kokonut //net/encryption
http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-hg2r-rg5c-cgfv
|
The AI Image Lab – Free AI Image Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on the 'wpz-ai-images' page. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
GHSA-vg4c-4xc2-v43h
|
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
|
[] | null | null | null | null | null |
|
GHSA-6355-v7q5-4p33
|
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Fix the null pointer dereference to ras_managerCheck ras_manager before using it
|
[] | null | 5.5 | null | null | null |
|
GHSA-g9wg-98c2-qv3v
|
TCPDF Cross-site Scripting vulnerability
|
TCPDF before 6.7.4 mishandles calls that use HTML syntax.
|
[] | 5.3 | 6.1 | null | null | null |
CVE-2019-17103
|
Get-task-allow entitlement via BDLDaemon on macOS
|
An Incorrect Default Permissions vulnerability in the BDLDaemon component of Bitdefender AV for Mac allows an attacker to elevate permissions to read protected directories. This issue affects: Bitdefender AV for Mac versions prior to 8.0.0.
|
[
"cpe:2.3:a:bitdefender:antivirus:*:*:*:*:*:macos:*:*"
] | null | 4.9 | null | null | null |
GHSA-q74g-4559-wf64
|
PHP remote file inclusion vulnerability in misc/function.php3 in PHP Generator of Object SQL Database (PGOSD), when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter.
|
[] | null | null | null | null | null |
|
CVE-2012-4014
|
Unspecified vulnerability in McAfee Email Anti-virus (formerly WebShield SMTP) allows remote attackers to cause a denial of service via unknown vectors.
|
[
"cpe:2.3:a:mcafee:email_and_web_security:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2021-42333
|
Huachu Digital Technology Co.,Ltd. Easytest - SQL Injection-1
|
The Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions.
|
[
"cpe:2.3:a:huaju:easytest_online_learning_test_platform:1705:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2015-1132
|
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2022-3786
|
X.509 Email Address Variable Length Buffer Overflow
|
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:nodejs:node.js:19.0.0:*:*:*:-:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-6h2q-3hc7-cvj3
|
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
|
[] | null | 8.8 | null | null | null |
|
CVE-2018-4333
|
A validation issue was addressed with improved input sanitization. This issue affected versions prior to iOS 12, macOS Mojave 10.14.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
RHSA-2013:1081
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
CVE-2024-1677
|
The Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to an improper capability check on 42 separate AJAX functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with subscriber access and above, to fully control the plugin which includes the ability to modify plugin settings and profiles, and create, edit, retrieve, and delete templates and barcodes.
|
[] | null | 6.3 | null | null | null |
|
GHSA-9rm5-p28h-jx5q
|
Multiple SQL injection vulnerabilities in includes/Function.php in the Easy2Map plugin before 1.2.5 for WordPress allow remote attackers to execute arbitrary SQL commands via the mapName parameter in an e2m_img_save_map_name action to wp-admin/admin-ajax.php and other unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-jq36-wchh-wc44
|
An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices before 12.06.03. System commands can be executed, via the web interface, after authentication.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-42335
|
x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
|
[
"cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2020-24149
|
Server-side request forgery (SSRF) in the Podcast Importer SecondLine (podcast-importer-secondline) plugin 1.1.4 for WordPress via the podcast_feed parameter in a secondline_import_initialize action to the secondlinepodcastimport page.
|
[
"cpe:2.3:a:secondline:podcast_importer_secondline:1.1.4:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2009-2903
|
Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
CVE-2020-17490
|
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
|
[
"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2013-3708
|
The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors.
|
[
"cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_7:*:*",
"cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_8:*:*",
"cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_vista:*:*",
"cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_xp:*:*",
"cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.86:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-25211
|
Arbitrary file upload vulnerability in SourceCodester Ordering System v 1.0 allows attackers to execute arbitrary code, via the file upload to ordering\admin\products\edit.php.
|
[
"cpe:2.3:a:online_ordering_system_project:online_ordering_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-p47j-22hp-c48h
|
Unspecified vulnerability in txzonemgr in Sun OpenSolaris has unknown impact and local attack vectors, related to a "Temporary file vulnerability," aka Bug ID 6653462.
|
[] | null | null | null | null | null |
|
GHSA-8mgh-wpwx-c2hm
|
Cross-site scripting (XSS) vulnerability in search.php in VidSharePro allows remote attackers to inject arbitrary web script or HTML via the searchtxt parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2017-12235
|
A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.
|
[
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-e_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-nx_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16t67-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16t67p-g-e_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-e_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-n_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-x_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_24t67-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4s-ts-g-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4s-ts-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4t-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4t-g-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4t-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4t-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-g-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8t67-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8t67p-g-e_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-b_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-e_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-n_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-l_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_ethernet_2000_series_firmware:15.2\\(5.4.32i\\)e2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-3q9w-xx57-q783
|
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.