id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2025:0276
|
Red Hat Security Advisory: webkit2gtk3 security update
|
WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption webkit: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.5 | null | null | null |
GHSA-3fq5-m2m4-f2qw
|
In Garden versions 0.22.0-0.329.0, a vulnerability has been discovered in the garden-linux nstar executable that allows access to files on the host system. By staging an application on Cloud Foundry using Diego and Garden installations with a malicious custom buildpack an end user could read files on the host system that the BOSH-created vcap user has permissions to read and then package them into their app droplet.
|
[] | null | null | 7.5 | null | null |
|
GHSA-w6p7-4p9q-w24c
|
Vulnerabilities within the Philips Brilliance CT kiosk environment (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) could enable a limited-access kiosk user or an unauthorized attacker to break-out from the containment of the kiosk environment, attain elevated privileges from the underlying Windows OS, and access unauthorized resources from the operating system.
|
[] | null | null | 8.7 | null | null |
|
GHSA-2648-xh5w-2w3q
|
In the Linux kernel, the following vulnerability has been resolved:can: ucan: fix out of bound read in strscpy() sourceCommit 7fdaf8966aae ("can: ucan: use strscpy() to instead of strncpy()")
unintentionally introduced a one byte out of bound read on strscpy()'s
source argument (which is kind of ironic knowing that strscpy() is meant
to be a more secure alternative :)).Let's consider below buffers:dest[len + 1]; /* will be NUL terminated */
src[len]; /* may not be NUL terminated */When doing:strncpy(dest, src, len);
dest[len] = '\0';strncpy() will read up to len bytes from src.On the other hand:strscpy(dest, src, len + 1);will read up to len + 1 bytes from src, that is to say, an out of bound
read of one byte will occur on src if it is not NUL terminated. Note
that the src[len] byte is never copied, but strscpy() still needs to
read it to check whether a truncation occurred or not.This exact pattern happened in ucan.The root cause is that the source is not NUL terminated. Instead of
doing a copy in a local buffer, directly NUL terminate it as soon as
usb_control_msg() returns. With this, the local firmware_str[] variable
can be removed.On top of this do a couple refactors:ucan_ctl_payload->raw is only used for the firmware string, so
rename it to ucan_ctl_payload->fw_str and change its type from u8 to
char.ucan_device_request_in() is only used to retrieve the firmware
string, so rename it to ucan_get_fw_str() and refactor it to make it
directly handle all the string termination logic.
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-11925
|
Data length received from firmware is not validated against the max allowed size which can result in buffer overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
|
[
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
RHSA-2023:1907
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null | null |
RHSA-2012:0884
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: post-authentication resource exhaustion bug via GSSAPI
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2008-2326
|
mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label.
|
[
"cpe:2.3:a:apple:bonjour:1.0.4:unknown:windows:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2013-5879
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.4.1 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Maintenance.
|
[
"cpe:2.3:a:oracle:fusion_middleware:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.4.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-crr3-h4m8-7f56
|
silverstripe/framework vulnerable to member disclosure in login form
|
There is a user ID enumeration vulnerability in our brute force error messages.Users that don't exist in will never get a locked out messageUsers that do exist, will get a locked out messageThis means an attacker can infer or confirm user details that exist in the member table.This issue has been resolved by ensuring that login attempt logging and lockout process works equivalently for non-existent users as it does for existant users.This is a regression of [SS-2017-002](https://www.silverstripe.org/download/security-releases/ss-2017-002).
|
[] | null | 5.3 | null | null | null |
GHSA-2q86-2ww4-wc89
|
An issue was discovered in iscflashx64.sys 3.9.3.0 in Insyde H2OFFT 6.20.00. When handling IOCTL 0x22229a, the input used to allocate a buffer and copy memory is mishandled. This could cause memory corruption or a system crash.
|
[] | null | 7.1 | null | null | null |
|
CVE-2021-44211
|
OX App Suite through 7.10.5 allows XSS via the class attribute of an element in an HTML e-mail signature.
|
[
"cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-pfg4-p438-p874
|
Laravel Framework Deserialization Vulnerability
|
The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the `__destruct` method of the PendingCommand class in `PendingCommand.php`.
|
[] | null | null | 9.8 | null | null |
CVE-2021-22732
|
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a code execution issue when an attacker loads unauthorized code on the web server.
|
[
"cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:homelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:homelynk:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2007-6487
|
Unspecified vulnerability in Plain Black WebGUI 7.4.0 through 7.4.17 allows remote authenticated users with Secondary Admin privileges to create Admin accounts, a different vulnerability than CVE-2006-0680.
|
[
"cpe:2.3:a:plain_black:webgui:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:plain_black:webgui:7.4.17:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-v4cc-vhfx-2cx7
|
Microsoft XML Core Services 3.0, 5.0, and 6.0 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "MSXML Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2434.
|
[] | null | null | null | null | null |
|
CVE-2017-2548
|
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-xpg3-c2hf-x9vf
|
A lack of cascading deletes in GitLab CE/EE affecting all versions starting from 13.0 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious Group Owner to retain a usable Group Access Token even after the Group is deleted, though the APIs usable by that token are limited.
|
[] | null | 3.8 | null | null | null |
|
CVE-2023-27767
|
An issue found in Wondershare Technology Co.,Ltd Dr.Fone v.12.4.9 allows a remote attacker to execute arbitrary commands via the drfone_setup_full3360.exe file.
|
[
"cpe:2.3:a:wondershare:dr.fone:12.4.9:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2014-9430
|
Cross-site scripting (XSS) vulnerability in httpd/cgi-bin/vpn.cgi/vpnconfig.dat in Smoothwall Express 3.0 SP3 allows remote attackers to inject arbitrary web script or HTML via the COMMENT parameter in an Add action.
|
[
"cpe:2.3:o:smoothwall:smoothwall:3.0:sp3:*:*:express:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4rgj-6vvq-8853
|
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the 'view' parameter in '/event/index.php'.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-30919
|
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2025-21719
|
ipmr: do not call mr_mfc_uses_dev() for unres entries
|
In the Linux kernel, the following vulnerability has been resolved:
ipmr: do not call mr_mfc_uses_dev() for unres entries
syzbot found that calling mr_mfc_uses_dev() for unres entries
would crash [1], because c->mfc_un.res.minvif / c->mfc_un.res.maxvif
alias to "struct sk_buff_head unresolved", which contain two pointers.
This code never worked, lets remove it.
[1]
Unable to handle kernel paging request at virtual address ffff5fff2d536613
KASAN: maybe wild-memory-access in range [0xfffefff96a9b3098-0xfffefff96a9b309f]
Modules linked in:
CPU: 1 UID: 0 PID: 7321 Comm: syz.0.16 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline]
pc : mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334
lr : mr_mfc_uses_dev net/ipv4/ipmr_base.c:289 [inline]
lr : mr_table_dump+0x694/0x8b0 net/ipv4/ipmr_base.c:334
Call trace:
mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline] (P)
mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334 (P)
mr_rtm_dumproute+0x254/0x454 net/ipv4/ipmr_base.c:382
ipmr_rtm_dumproute+0x248/0x4b4 net/ipv4/ipmr.c:2648
rtnl_dump_all+0x2e4/0x4e8 net/core/rtnetlink.c:4327
rtnl_dumpit+0x98/0x1d0 net/core/rtnetlink.c:6791
netlink_dump+0x4f0/0xbc0 net/netlink/af_netlink.c:2317
netlink_recvmsg+0x56c/0xe64 net/netlink/af_netlink.c:1973
sock_recvmsg_nosec net/socket.c:1033 [inline]
sock_recvmsg net/socket.c:1055 [inline]
sock_read_iter+0x2d8/0x40c net/socket.c:1125
new_sync_read fs/read_write.c:484 [inline]
vfs_read+0x740/0x970 fs/read_write.c:565
ksys_read+0x15c/0x26c fs/read_write.c:708
|
[] | null | null | null | null | null |
CVE-2019-0357
|
The administrator of SAP HANA database, before versions 1.0 and 2.0, can misuse HANA to execute commands with operating system "root" privileges.
|
[
"cpe:2.3:a:sap:hana:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 7.2 | null |
|
CVE-2019-9397
|
In Bluetooth, there is possible controlled termination due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115747410
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2012-4049
|
epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:sparc:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"
] | null | null | null | 2.9 | null |
|
CVE-2022-35202
|
A security issue in Sitevision version 10.3.1 and older allows a remote attacker, in certain (non-default) scenarios, to gain access to the private keys used for signing SAML Authn requests. The underlying issue is a Java keystore that may become accessible and downloadable via WebDAV. This keystore is protected with a low-complexity, auto-generated password.
|
[] | null | 5.1 | null | null | null |
|
GHSA-g5m2-22h2-rr3j
|
Creation of Temporary File With Insecure Permissions in logilab-commons
|
The Execute class in shellutils in logilab-common before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
|
[] | 6.3 | 5.6 | null | null | null |
GHSA-x5xx-j968-8f6j
|
Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.
|
[] | null | null | null | null | null |
|
CVE-2001-0428
|
Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a denial of service via an IP packet with an invalid IP option.
|
[
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2013-5844
|
Unspecified vulnerability in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
|
[
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-74g2-v5gc-hj7f
|
The Weaver Xtreme Theme Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's div shortcode in all versions up to, and including, 6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2022-36042
|
Rizin Out-of-bounds Write vulnerability in dyld cache binary plugin
|
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from dyld cache files. A user opening a malicious dyld cache file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810 contains a patch.
|
[
"cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2022-33905
|
DMA transactions which are targeted at input buffers used for the AhciBusDxe software SMI handler could cause SMRAM corruption (a TOCTOU attack). DMA transactions which are targeted at input buffers used for the software SMI handler used by the AhciBusDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group, Fixed in kernel 5.2: 05.27.23, kernel 5.3: 05.36.23, kernel 5.4: 05.44.23, kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022047
|
[
"cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
GHSA-6439-mj9p-x34m
|
The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the "Try to convert serialized values" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
|
[] | null | 8.1 | null | null | null |
|
CVE-2011-1954
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Post Revolution 0.8.0c-2 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests to (1) ajax-weblog-guardar.php, (2) verpost.php, (3) comments.php, or (4) perfil.php.
|
[
"cpe:2.3:a:postrev:post_revolution:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.8.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.8.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.8.0c:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-35035
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b559f.
|
[
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-rx3q-2fm4-m96h
|
Race condition in SDBINST for SAP database 7.3.0.29 creates critical files with world-writable permissions before initializing the setuid bits, which allows local attackers to gain root privileges by modifying the files before the permissions are changed.
|
[] | null | null | null | null | null |
|
GHSA-xxh4-49r4-6rx5
|
TOTOLINK A720R v4.1.5cu.470_B20200911 was discovered to contain a stack overflow in the Form_Login function. This vulnerability allows attackers to cause a Denial of Service (DoS) via the Host parameter.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2019:1723
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: device_tree: heap buffer overflow while loading device tree blob
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 7 | null | null |
GHSA-jmq5-mqx2-5f5c
|
The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-5829
|
An access restriction bypass vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found.
|
[
"cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
RHSA-2022:2211
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in RDMA listen() kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7 | null | null | null |
GHSA-7hfh-rmxm-mv4v
|
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv4FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv4AddressRangeStart field.
|
[] | null | 8.8 | null | null | null |
|
CVE-2018-10403
|
An issue was discovered in F-Secure XFENCE and Little Flocker. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
|
[
"cpe:2.3:a:f-secure:xfence:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-9qx3-hr7q-4q26
|
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=files
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-45508
|
Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, and RBR850 before 3.2.17.12.
|
[
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
|
GHSA-fh45-j2m9-4mxm
|
Cross-Site Request Forgery (CSRF) vulnerability in User Local Inc UserHeat Plugin.This issue affects UserHeat Plugin: from n/a through 1.1.6.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-26224
|
Windows DNS Server Remote Code Execution Vulnerability
|
Windows DNS Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2021-37823
|
OpenCart 3.0.3.7 allows users to obtain database information or read server files through SQL injection in the background.
|
[
"cpe:2.3:a:opencart:opencart:3.0.3.7:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
RHSA-2021:1515
|
Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)
|
jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: default typing mishandling leading to remote code execution golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
|
[
"cpe:/a:redhat:logging:5.0::el8"
] | null | 8.1 | 9.8 | null | null |
CVE-2024-9088
|
SourceCodester Telecom Billing Management System login buffer overflow
|
A vulnerability has been found in SourceCodester Telecom Billing Management System 1.0 and classified as critical. This vulnerability affects the function login. The manipulation of the argument uname leads to buffer overflow. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:telecom_billing_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 5.8 | null |
CVE-2018-8761
|
protected\apps\member\controller\shopcarController.php in Yxcms building system (compatible cell phone) v1.4.7 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture.
|
[
"cpe:2.3:a:yxcms:yxcms:1.4.7:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-5w78-c46h-gqxq
|
The All-In-One Security (AIOS) WordPress plugin before 5.1.3 leaked settings of the plugin publicly, including the used email address.
|
[] | null | 5.3 | null | null | null |
|
GHSA-5v7q-gqff-9cj8
|
In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2024:7102
|
Red Hat Security Advisory: grafana security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null | null |
GHSA-5589-5vr7-rjh2
|
A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
[] | null | 6.1 | null | null | null |
|
GHSA-rcjf-5cjm-p5q4
|
A cross-site scripting (XSS) vulnerability in MiroTalk P2P before commit f535b35 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the settings module.
|
[] | null | 6.1 | null | null | null |
|
GHSA-xx9m-mmw4-chgv
|
Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command.
|
[] | null | null | null | null | null |
|
GHSA-r9hr-75f4-vvmj
|
Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not use encryption, which allows remote attackers to interfere with traffic control by replaying transmissions on a wireless network.
|
[] | null | null | null | null | null |
|
cisco-sa-20190327-call-home-cert
|
Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability
|
A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate.
The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"]
|
[] | null | null | 5.9 | null | null |
RHSA-2024:4412
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
|
[
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 6.1 | null | null | null |
GHSA-jq6r-qxvf-4wrv
|
A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). This affects the function formQosManageDouble_auto. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The identifier VDB-262137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-37843
|
The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.
|
[
"cpe:2.3:a:atlassian:saml_single_sign_on:*:*:*:*:*:bamboo:*:*",
"cpe:2.3:a:atlassian:saml_single_sign_on:*:*:*:*:*:bitbucket:*:*",
"cpe:2.3:a:atlassian:saml_single_sign_on:*:*:*:*:*:fisheye:*:*",
"cpe:2.3:a:atlassian:saml_single_sign_on:*:*:*:*:*:confluence:*:*",
"cpe:2.3:a:atlassian:saml_single_sign_on:*:*:*:*:*:jira:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2009-0699
|
Cross-site scripting (XSS) vulnerability in pagesUTF8/auftrag_allgemeinauftrag.jsp in Plunet BusinessManager 4.1 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the (1) QUB and (2) Bez74 parameters.
|
[
"cpe:2.3:a:plunet:business_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2020-17542
|
Cross Site Scripting (XSS) in dotCMS v5.1.5 allows remote attackers to execute arbitrary code by injecting a malicious payload into the "Task Detail" comment window of the "/dotAdmin/#/c/workflow" component.
|
[
"cpe:2.3:a:dotcms:dotcms:5.1.5:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2020-8946
|
Netis WF2471 v1.2.30142 devices allow an authenticated attacker to execute arbitrary OS commands via shell metacharacters in the /cgi-bin-igd/sys_log_clean.cgi log_3g_type parameter.
|
[
"cpe:2.3:o:netis-systems:wf2471_firmware:1.2.30142:*:*:*:*:*:*:*",
"cpe:2.3:h:netis-systems:wf2471:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 | null |
|
GHSA-f4c5-7xpg-gxpc
|
Heap-based buffer overflow in popcorn.exe in Ultrafunk Popcorn 1.87 allows remote POP3 servers to cause a denial of service (application crash) via a long string in a +OK response. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2011-2125
|
Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2025-41663
|
Weidmueller: Security routers IE-SR-2TX are affected by Command Injection
|
For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
|
[] | null | 9.8 | null | null | null |
GHSA-wxxh-cpj5-jh49
|
IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system.
|
[] | null | 5.4 | null | null | null |
|
GHSA-w64g-g6j6-ph4q
|
Improper authorization vulnerability in Cybozu Garoon 4.0.0 to 4.10.3 allows remote authenticated attackers to alter the application's data via the applications 'E-mail' and 'Messages'.
|
[] | null | null | null | null | null |
|
CVE-2025-24296
|
Improper input validation in some firmware for the Intel(R) E810 Ethernet before version 4.6 may allow a privileged user to enable denial of service via local access.
|
[] | 5.1 | 6 | null | null | null |
|
CVE-2025-4933
|
ponaravindb Hospital-Management-System doctor-panel.php sql injection
|
A vulnerability, which was classified as critical, was found in ponaravindb Hospital-Management-System 1.0. This affects an unknown part of the file /doctor-panel.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2020-35902
|
An issue was discovered in the actix-codec crate before 0.3.0-beta.1 for Rust. There is a use-after-free in Framed.
|
[
"cpe:2.3:a:actix:actix-codec:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2019:2471
|
Red Hat Security Advisory: openssl security update
|
openssl: 0-byte record padding oracle
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.9 | null | null | null |
CVE-2002-0481
|
An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function.
|
[
"cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
RHSA-2022:8855
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (openstack-neutron) security update
|
openstack-neutron: unrestricted creation of security groups
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.3 | null | null | null |
CVE-2022-28578
|
It is found that there is a command injection vulnerability in the setOpenVpnCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
|
[
"cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-v455-pq67-wwvm
|
PluginKit in Apple iOS before 9 allows attackers to bypass an intended app-trust requirement and install arbitrary extensions via a crafted enterprise app.
|
[] | null | null | null | null | null |
|
GHSA-vv7w-652j-842v
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5881.
|
[] | null | null | null | null | null |
|
GHSA-228c-q92x-7vr5
|
Cross-site scripting (XSS) vulnerability in usersettings.php in e107 2.0.0 allows remote attackers to inject arbitrary web script or HTML via the "Real Name" value.
|
[] | null | null | null | null | null |
|
GHSA-69xf-x2fj-fh4j
|
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
|
[] | null | null | null | null | null |
|
GHSA-fjxw-756f-ww6x
|
Integer overflow in diag command handler when user inputs a large value for number of tasks field in the request packet in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, APQ8096AU, APQ8098, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null | null |
|
CVE-2008-1997
|
Unspecified vulnerability in the ADMIN_SP_C2 procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 allows remote authenticated users to execute arbitrary code via unknown vectors. NOTE: the ADMIN_SP_C issue is already covered by CVE-2008-0699.
|
[
"cpe:2.3:a:ibm:db2:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak11:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak12:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak13:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak14:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak15:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak6a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak6b:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak6c:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak7a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak7b:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak8a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:8.0:fixpak9a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp2a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:-:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
GHSA-9m6j-j739-5rcg
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13307.
|
[] | null | 7.8 | null | null | null |
|
GHSA-q89c-2293-ppjp
|
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.
|
[] | null | 7.2 | null | null | null |
|
cisco-sa-20170320-ani
|
Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Registrar Denial of Service Vulnerability
|
A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics:
Running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature
Configured as an autonomic registrar
Has a whitelist configured
An exploit could allow the attacker to cause the affected device to reload.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Note: Also see the companion advisory for affected devices that support Autonomic Networking: Cisco IOS and IOS XE Software IPv6 Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-aniipv6"].
|
[] | null | null | 7.4 | null | null |
GHSA-vq55-fw4v-2c2w
|
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | 6.7 | null | null | null |
|
CVE-2025-24220
|
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4. An app may be able to read a persistent device identifier.
|
[] | null | 5.5 | null | null | null |
|
CVE-2014-5838
|
The Girls Games - Shoes Maker (aka com.g6677.android.shoemaker) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:6677g:girls_games_-_shoes_maker:1.0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2024-34792
|
WordPress Dextaz Ping plugin <= 0.65 - Remote Code Execution (RCE) vulnerability
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in dexta Dextaz Ping allows Command Injection.This issue affects Dextaz Ping: from n/a through 0.65.
|
[
"cpe:2.3:a:dextaz_ping_project:dextaz_ping:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | null | null |
GHSA-9388-pxcv-qr7p
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature.
|
[] | null | 4.3 | null | null | null |
|
GHSA-j274-v462-w7rr
|
In generateInfo of PackageInstallerSession.java, there is a possible leak of cross-profile URI data during app installation due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-142125338
|
[] | null | null | null | null | null |
|
RHSA-2025:8690
|
Red Hat Security Advisory: Red Hat build of Keycloak 26.2.5 Security Update
|
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream org.keycloak.protocol.services: Keycloak hostname verification
|
[
"cpe:/a:redhat:build_keycloak:26"
] | null | 8.2 | null | null | null |
CVE-2022-29164
|
Privilege Escalation in argo-workflows
|
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running. As the script has access to the Argo Server API (as the victim), so may read information about the victim’s workflows, or create and delete workflows. Note the attacker must be an insider: they must have access to the same cluster as the victim and must already be able to run their own workflows. The attacker must have an understanding of the victim’s system. We have seen no evidence of this in the wild. We urge all users to upgrade to the fixed versions.
|
[
"cpe:2.3:a:argo_workflows_project:argo_workflows:*:*:*:*:*:kubernetes:*:*"
] | null | 7.1 | null | null | null |
GHSA-jvwr-fmgq-5q3g
|
A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, Fortiproxy version 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 allows attacker to denial of service via specially crafted HTTP requests.
|
[] | null | 6.5 | null | null | null |
|
GHSA-6jff-f5rm-jgq5
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2018-1877
|
IBM Robotic Process Automation with Automation Anywhere 11 could store highly sensitive information in the form of unencrypted passwords that would be available to a local user. IBM X-Force ID: 151713.
|
[
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:11.0:*:*:*:*:*:*:*"
] | null | null | 6.2 | null | null |
|
GHSA-8g54-57wc-xjfh
|
A configuration issue was addressed with additional restrictions. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. An attacker in a privileged network position may be able to bypass HSTS for a limited number of specific top-level domains previously not in the HSTS preload list.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.