id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-xcmm-84q5-43xv
|
IBM InfoSphere Data Flow Designer (IBM InfoSphere Information Server 11.7 ) is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 201302.
|
[] | null | null | null | null | null |
|
CVE-2023-25801
|
TensorFlow has double free in Fractional(Max/Avg)Pool
|
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
GHSA-mvjm-xvhc-97rr
|
Possible null pointer dereference due to improper validation of APE clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables
|
[] | null | 7.5 | null | null | null |
|
CVE-2000-1052
|
Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet.
|
[
"cpe:2.3:a:macromedia:jrun:2.3.x:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-2663
|
extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
|
[
"cpe:2.3:a:netfilter:iptables:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-31229
|
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant.
|
[
"cpe:2.3:a:ezxml_project:ezxml:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-hcf3-m8fc-xfmv
|
A vulnerability in exporting functions of the user interface for Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to view file directory listings and download files. Affected Products: Cisco Prime Collaboration Assurance software versions 11.0, 11.1, and 11.5 are vulnerable. Cisco Prime Collaboration Assurance software versions prior to 11.0 are not vulnerable. More Information: CSCvc86238. Known Affected Releases: 11.5(0).
|
[] | null | null | 4.3 | null | null |
|
GHSA-2wfx-62fp-34f7
|
The Auto Trader (aka za.co.autotrader.android.app) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2019-12645
|
Cisco Jabber Client Framework for Mac Code Execution Vulnerability
|
A vulnerability in Cisco Jabber Client Framework (JCF) for Mac Software, installed as part of the Cisco Jabber for Mac client, could allow an authenticated, local attacker to execute arbitrary code on an affected device The vulnerability is due to improper file level permissions on an affected device when it is running Cisco JCF for Mac Software. An attacker could exploit this vulnerability by authenticating to the affected device and executing arbitrary code or potentially modifying certain configuration files. A successful exploit could allow the attacker to execute arbitrary code or modify certain configuration files on the device using the privileges of the installed Cisco JCF for Mac Software.
|
[
"cpe:2.3:a:cisco:jabber:*:*:*:*:*:macos:*:*"
] | null | null | 6.7 | null | null |
GHSA-jvf5-x86m-gp68
|
Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file.
|
[] | null | null | null | null | null |
|
CVE-2025-25072
|
WordPress WP Admin Custom Page plugin <= 1.5.0 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in thunderbax WP Admin Custom Page allows Stored XSS. This issue affects WP Admin Custom Page: from n/a through 1.5.0.
|
[] | null | 7.1 | null | null | null |
GHSA-92cv-rhgw-5fm8
|
HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack.
|
[] | null | 6.1 | null | null | null |
|
CVE-2023-25544
|
Dell NetWorker versions 19.5 and earlier contain 'Apache Tomcat' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.
|
[
"cpe:2.3:a:dell:emc_networker:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-mqg6-vqf5-9pf3
|
In getInstalledAccessibilityPreferences of AccessibilitySettings.java, there is a possible way to hide an enabled accessibility service in the accessibility service settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
|
[] | null | 8.4 | null | null | null |
|
GHSA-c5vq-9hf6-g7cw
|
The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-41511
|
The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
|
[
"cpe:2.3:a:lodging_reservation_management_system_project:lodging_reservation_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-xwmw-rf59-w488
|
Cross-site Scripting (XSS) vulnerability in web GUI of Secomea GateManager allows an attacker to inject arbitrary javascript code. This issue affects: Secomea GateManager all versions prior to 9.4.
|
[] | null | null | null | null | null |
|
GHSA-hjxc-5vcp-9rmf
|
Cross-Site Request Forgery (CSRF) vulnerability in Antonio Gocaj Go Animate allows Stored XSS.This issue affects Go Animate: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-whw4-3p4x-p8fw
|
Visual Studio Code Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
RHSA-2024:1130
|
Red Hat Security Advisory: openssh security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null | null |
ICSA-21-082-03
|
GE Reason DR60
|
The software contains a hard-coded password it uses for its own inbound authentication or for outbound communication to external components.CVE-2021-27440 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The software constructs all or part of a code segment using externally influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.CVE-2021-27438 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.CVE-2021-27454 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
GHSA-phc2-5hf4-x4h3
|
IBM DOORS Next Generation (DNG/RRC) 6.0.2 and 6.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125459.
|
[] | null | null | 5.4 | null | null |
|
CVE-2006-0277
|
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) APPS01 in the (a) Application Install component; (2) APPS07 in the (b) Oracle Applications Framework component; (3) APPS08, (4) APPS09, (5) APPS10, and (6) APPS11 in the (c) Oracle Applications Technology Stack component; (7) APPS12 in the (d) Oracle Human Resources component; (8) APPS15 and (9) APPS16 in the (e) Oracle Marketing component; (10) APPS17 in the (f) Marketing Encyclopedia System component; (11) APPS18 in the (g) Oracle Trade Management component; and (12) APPS19 in the (h) Oracle Web Applications Desktop Integration component.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-cc3m-w7mm-948m
|
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the postID parameter in the edit method
|
[] | null | 6.7 | null | null | null |
|
GHSA-r794-wg43-vp3f
|
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.
|
[] | null | null | null | null | null |
|
GHSA-c9jh-3w3h-g2pw
|
IBM API Connect 5.0.0.0 - 5.0.6.0 could allow a remote attacker to bypass security restrictions of the api, caused by improper handling of security policy. By crafting a suitable request, an attacker could exploit this vulnerability to bypass security and use the vulnerable API. IBM X-Force ID: 126230.
|
[] | null | null | 5.3 | null | null |
|
CVE-2014-4467
|
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2024:5871
|
Red Hat Security Advisory: bind security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null | null |
GHSA-wc36-xgcc-jwpr
|
Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord`
|
Affected versions of this crate did not check that the public key the signature was created with matches the peer ID of the peer record.
Any combination was considered valid.This allows an attacker to republish an existing `PeerRecord` with a different `PeerId`.
|
[] | null | null | null | null | null |
CVE-2018-10915
|
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
|
[
"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
] | null | null | 8.5 | null | null |
|
CVE-2023-52104
|
Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality.
|
[
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2019-4719
|
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within runmqras data.
|
[
"cpe:2.3:a:ibm:mq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | null | 5.1 | null | null |
|
GHSA-x8wj-6m73-gfqp
|
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
|
ImpactThe vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.PatchesYes, see version 1.9.3 and 2.1.5.Referenceshttps://owasp.org/www-community/attacks/Path_TraversalCredits:This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: thibaud.kehler@syss.de
|
[] | null | 8.8 | null | null | null |
CVE-2022-31176
|
Grafana Image Renderer leaking files
|
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
|
[
"cpe:2.3:a:grafana:grafana-image-renderer:*:*:*:*:*:grafana:*:*"
] | null | 8.3 | null | null | null |
GHSA-gf2r-mc8c-m8r8
|
An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension.
|
[] | null | null | null | null | null |
|
GHSA-cq3h-j934-fgjg
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. Processing an image may result in disclosure of process memory
|
[] | null | 5.5 | null | null | null |
|
RHSA-2008:0815
|
Red Hat Security Advisory: yum-rhn-plugin security update
|
yum-rhn-plugin: does not verify SSL certificate for all communication with RHN server
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2014-3942
|
The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object.
|
[
"cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
GHSA-crq8-2jwq-9c2c
|
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
|
[] | null | null | null | null | null |
|
CVE-2023-32869
|
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363689.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2017-5119
|
Use of an uninitialized value in Skia in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 | null |
|
CVE-2022-2319
|
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
|
[
"cpe:2.3:a:x.org:xorg-server:21.1.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-jf8w-2pxr-j438
|
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 uses part of the MAC address as part of the RC4 setup key, which makes it easier for remote attackers to guess the key via a brute-force attack.
|
[] | null | null | null | null | null |
|
CVE-2019-13578
|
A SQL injection vulnerability exists in the Impress GiveWP Give plugin through 2.5.0 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/payments/class-payments-query.php.
|
[
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2024-52558
|
Planet Technology Planet WGS-804HPT Integer Underflow
|
The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP request, which could allow the attacker to crash the program.
|
[
"cpe:2.3:o:planet_technology_corp:wgs-804hpt_firmware:1.305b210531:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | null | null | null |
GHSA-7xcv-cvmj-qpgr
|
The document management module in NOLA 1.1.1 and 1.1.2 does not restrict the types of files that are uploaded, which allows remote attackers to upload and execute arbitrary PHP files with extensions such as .php4.
|
[] | null | null | null | null | null |
|
GHSA-p6jh-p7q8-pcrg
|
Prototype Pollution in nodee-utils
|
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
|
[] | null | 9.8 | null | null | null |
RHSA-2015:0287
|
Red Hat Security Advisory: foreman-proxy security update
|
foreman-proxy: failure to verify SSL certificates
|
[
"cpe:/a:redhat:openstack-installer:5::el6"
] | null | null | null | null | null |
GHSA-q8jr-ccjc-xmxg
|
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270.
|
[] | null | null | 9.8 | null | null |
|
GHSA-cmc6-jgxj-h4r2
|
Missing Authorization vulnerability in Paul Ryley Site Reviews allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Site Reviews: from n/a through 6.10.2.
|
[] | null | 5.3 | null | null | null |
|
GHSA-wjjc-m6gv-3m9m
|
Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 via the "*list" parameters (e.g. filter_lwlist, keyword_rulelist, etc) in every ".asp" page containing a list of stored strings. The following asp files are affected: (1) cgi-bin/APP_Installation.asp, (2) cgi-bin/Advanced_ACL_Content.asp, (3) cgi-bin/Advanced_ADSL_Content.asp, (4) cgi-bin/Advanced_ASUSDDNS_Content.asp, (5) cgi-bin/Advanced_AiDisk_ftp.asp, (6) cgi-bin/Advanced_AiDisk_samba.asp, (7) cgi-bin/Advanced_DSL_Content.asp, (8) cgi-bin/Advanced_Firewall_Content.asp, (9) cgi-bin/Advanced_FirmwareUpgrade_Content.asp, (10) cgi-bin/Advanced_GWStaticRoute_Content.asp, (11) cgi-bin/Advanced_IPTV_Content.asp, (12) cgi-bin/Advanced_IPv6_Content.asp, (13) cgi-bin/Advanced_KeywordFilter_Content.asp, (14) cgi-bin/Advanced_LAN_Content.asp, (15) cgi-bin/Advanced_Modem_Content.asp, (16) cgi-bin/Advanced_PortTrigger_Content.asp, (17) cgi-bin/Advanced_QOSUserPrio_Content.asp, (18) cgi-bin/Advanced_QOSUserRules_Content.asp, (19) cgi-bin/Advanced_SettingBackup_Content.asp, (20) cgi-bin/Advanced_System_Content.asp, (21) cgi-bin/Advanced_URLFilter_Content.asp, (22) cgi-bin/Advanced_VPN_PPTP.asp, (23) cgi-bin/Advanced_VirtualServer_Content.asp, (24) cgi-bin/Advanced_WANPort_Content.asp, (25) cgi-bin/Advanced_WAdvanced_Content.asp, (26) cgi-bin/Advanced_WMode_Content.asp, (27) cgi-bin/Advanced_WWPS_Content.asp, (28) cgi-bin/Advanced_Wireless_Content.asp, (29) cgi-bin/Bandwidth_Limiter.asp, (30) cgi-bin/Guest_network.asp, (31) cgi-bin/Main_AccessLog_Content.asp, (32) cgi-bin/Main_AdslStatus_Content.asp, (33) cgi-bin/Main_Spectrum_Content.asp, (34) cgi-bin/Main_WebHistory_Content.asp, (35) cgi-bin/ParentalControl.asp, (36) cgi-bin/QIS_wizard.asp, (37) cgi-bin/QoS_EZQoS.asp, (38) cgi-bin/aidisk.asp, (39) cgi-bin/aidisk/Aidisk-1.asp, (40) cgi-bin/aidisk/Aidisk-2.asp, (41) cgi-bin/aidisk/Aidisk-3.asp, (42) cgi-bin/aidisk/Aidisk-4.asp, (43) cgi-bin/blocking.asp, (44) cgi-bin/cloud_main.asp, (45) cgi-bin/cloud_router_sync.asp, (46) cgi-bin/cloud_settings.asp, (47) cgi-bin/cloud_sync.asp, (48) cgi-bin/device-map/DSL_dashboard.asp, (49) cgi-bin/device-map/clients.asp, (50) cgi-bin/device-map/disk.asp, (51) cgi-bin/device-map/internet.asp, (52) cgi-bin/error_page.asp, (53) cgi-bin/index.asp, (54) cgi-bin/index2.asp, (55) cgi-bin/qis/QIS_PTM_manual_setting.asp, (56) cgi-bin/qis/QIS_admin_pass.asp, (57) cgi-bin/qis/QIS_annex_setting.asp, (58) cgi-bin/qis/QIS_bridge_cfg_tmp.asp, (59) cgi-bin/qis/QIS_detect.asp, (60) cgi-bin/qis/QIS_finish.asp, (61) cgi-bin/qis/QIS_ipoa_cfg_tmp.asp, (62) cgi-bin/qis/QIS_manual_setting.asp, (63) cgi-bin/qis/QIS_mer_cfg.asp, (64) cgi-bin/qis/QIS_mer_cfg_tmp.asp, (65) cgi-bin/qis/QIS_ppp_cfg.asp, (66) cgi-bin/qis/QIS_ppp_cfg_tmp.asp, (67) cgi-bin/qis/QIS_wireless.asp, (68) cgi-bin/query_wan_status.asp, (69) cgi-bin/query_wan_status2.asp, and (70) cgi-bin/start_apply.asp.
|
[] | null | 5.4 | null | null | null |
|
CVE-2020-13643
|
An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The live editor feature did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The live_editor_panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
|
[
"cpe:2.3:a:siteorigin:page_builder:*:*:*:*:*:wordpress:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2014-0435
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3, 6.3.1, and 6.3.2 allows remote authenticated users to affect availability via unknown vectors related to Data, Domain & Function Security.
|
[
"cpe:2.3:a:oracle:supply_chain_products_suite:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-4c2h-m2v8-77j8
|
** DISPUTED ** The Task scheduler (at.exe) on Microsoft Windows XP spawns each scheduled process with SYSTEM permissions, which allows local users to gain privileges. NOTE: this issue has been disputed by third parties, who state that the Task scheduler is limited to the Administrators group by default upon installation.
|
[] | null | null | null | null | null |
|
CVE-2021-28030
|
An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes.
|
[
"cpe:2.3:a:truetype_project:truetype:*:*:*:*:*:rust:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-21539
|
Vulnerability in the PeopleSoft Enterprise FIN eSettlements product of Oracle PeopleSoft (component: eSettlements). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN eSettlements. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN eSettlements accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN eSettlements accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_fin_esettlements:9.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2008-0389
|
Unspecified vulnerability in the serveServletsByClassnameEnabled feature in IBM WebSphere Application Server (WAS) 6.0 through 6.0.2.25, 6.1 through 6.1.0.14, and 5.1.1.x before 5.1.1.18 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-w4fr-hcc6-hpqf
|
Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
GHSA-jrq2-fq6q-8g5w
|
HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2623.
|
[] | null | null | 9.8 | null | null |
|
GHSA-jh67-whmg-96gq
|
An issue was discovered on Alcatel-Lucent OmniVista 8770 devices before 4.1.2. An authenticated remote attacker, with elevated privileges in the Web Directory component on port 389, may upload a PHP file to achieve Remote Code Execution as SYSTEM.
|
[] | null | null | null | null | null |
|
GHSA-vwqq-5vrc-xw9h
|
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender
|
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
|
[] | null | 3.7 | null | null | null |
CVE-2024-3498
|
Incorrect Permission Assignment Privilege Escalation Vulnerability
|
Attackers can then execute malicious files by enabling certain services of the printer via the web configuration page and elevate its privileges to root. As for the affected products/models/versions, see the reference URL.
|
[
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2025-9107
|
Portabilis i-Diario search_autocomplete cross site scripting
|
A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 4.3 | 4.3 | 5 | null |
GHSA-7vg8-pfw4-vmjp
|
The Social Auto Poster plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpw_auto_poster_get_image_path' function in all versions up to, and including, 5.3.14. This makes it possible for authenticated attackers, with Contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible. An attacker can use CVE-2024-6754 to exploit with subscriber-level access.
|
[] | null | 8.8 | null | null | null |
|
GHSA-6qrp-2h7m-mgc8
|
The BOTCHA Spam Prevention module 7.x-1.x before 7.x-1.6, 7.x-2.x before 7.x-2.1, and 7.x-3.x before 7.x-3.3 for Drupal, when the debugging level is set to 5 or 6, logs the content of submitted forms, which allows context-dependent users to obtain sensitive information such as usernames and passwords by reading the log file.
|
[] | null | null | null | null | null |
|
RHSA-2020:2563
|
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 14 security update
|
JBoss: JAXP in EAP 7.0 allows RCE via XSL EAP: XXE issue in TransformerFactory
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_cd:14"
] | null | null | 7.5 | null | null |
GHSA-hf89-j5g5-5g8w
|
Cross-site scripting (XSS) vulnerability in infoware MapSuite MapAPI 1.0.x before 1.0.36 and 1.1.x before 1.1.49 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-q969-45px-2vhh
|
Multiple unspecified vulnerabilities in Esqlanelapse before 2.6 have unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-h987-8x4q-cfpp
|
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote authenticated users to affect integrity via vectors related to SWSE Server, a different vulnerability than CVE-2016-5464.
|
[] | null | null | 4.1 | null | null |
|
RHSA-2015:0888
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.5.1 update
|
vdsm: Users attempting a live storage migration create snapshot without snapshot creation permissions ovirt-engine-dwh: incorrect permissions on plugin file containing passwords
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null | null |
GHSA-crqg-wcv6-jc2c
|
MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting.
|
[] | null | null | null | null | null |
|
CVE-2018-4465
|
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-p4gw-2vrq-j64q
|
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
|
[] | null | null | null | null | null |
|
RHSA-2025:3935
|
Red Hat Security Advisory: kernel security update
|
kernel: asix: fix uninit-value in asix_mdio_read() kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size kernel: bonding: stop the device in bond_setup_by_slave() kernel: tcp: make sure init the accept_queue's spinlocks once kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: netfilter: nf_tables: reject new basechain after table flag update kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB kernel: igb: Fix string truncation warnings in igb_set_fw_version kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7.1 | null | null | null |
CVE-2021-46980
|
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
|
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
commit 4dbc6a4ef06d ("usb: typec: ucsi: save power data objects
in PD mode") introduced retrieval of the PDOs when connected to a
PD-capable source. But only the first 4 PDOs are received since
that is the maximum number that can be fetched at a time given the
MESSAGE_IN length limitation (16 bytes). However, as per the PD spec
a connected source may advertise up to a maximum of 7 PDOs.
If such a source is connected it's possible the PPM could have
negotiated a power contract with one of the PDOs at index greater
than 4, and would be reflected in the request data object's (RDO)
object position field. This would result in an out-of-bounds access
when the rdo_index() is used to index into the src_pdos array in
ucsi_psy_get_voltage_now().
With the help of the UBSAN -fsanitize=array-bounds checker enabled
this exact issue is revealed when connecting to a PD source adapter
that advertise 5 PDOs and the PPM enters a contract having selected
the 5th one.
[ 151.545106][ T70] Unexpected kernel BRK exception at EL1
[ 151.545112][ T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP
...
[ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c
[ 151.545507][ T70] lr : power_supply_show_property+0xc0/0x328
...
[ 151.545542][ T70] Call trace:
[ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c
[ 151.545546][ T70] power_supply_uevent+0x1a4/0x2f0
[ 151.545550][ T70] dev_uevent+0x200/0x384
[ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8
[ 151.545557][ T70] power_supply_changed_work+0x174/0x31c
[ 151.545562][ T70] process_one_work+0x244/0x6f0
[ 151.545564][ T70] worker_thread+0x3e0/0xa64
We can resolve this by instead retrieving and storing up to the
maximum of 7 PDOs in the con->src_pdos array. This would involve
two calls to the GET_PDOS command.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2024-27983
|
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
|
[
"cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:*"
] | null | null | 8.2 | null | null |
|
GHSA-8v6j-gc74-fmpp
|
Ajax Pro Cross-site Scripting
|
OverviewAffected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects.DescriptionCross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network.ReleasesReleases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.WorkaroundsA workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub.Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js.Clients need to refresh the web page to download the changed JavaScript code.ReferencesCommit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2bNote: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
|
[] | null | 6.3 | null | null | null |
CVE-2020-3539
|
Cisco Data Center Network Manager Authorization Bypass Vulnerability
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.
The vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by convincing a user to click a malicious URL. A successful exploit could allow a low-privileged attacker to list, view, create, edit, and delete templates in the same manner as a user with Administrator privileges.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.3 | null | null | null |
CVE-2018-1905
|
IBM WebSphere Application Server 9.0.0.0 through 9.0.0.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 152534.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | null | null |
|
GHSA-c2hp-xp2f-q6hj
|
SQL injection vulnerability in Netbula Anyboard allows remote attackers to execute arbitrary SQL commands via the user name in the login form.
|
[] | null | null | null | null | null |
|
GHSA-c694-m6fh-cj5q
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to rendering a path. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 8.8 | null | null |
|
GHSA-697x-76hh-g8hq
|
The Category Discount Woocommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpcd_save_discount() function in all versions up to, and including, 4.12. This makes it possible for unauthenticated attackers to modify product category discounts that could lead to loss of revenue.
|
[] | null | 5.3 | null | null | null |
|
GHSA-4hpj-g79q-h8h5
|
The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket.
|
[] | null | 5.5 | null | null | null |
|
GHSA-mhfc-6hhr-w9gw
|
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2014:0513
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Out-of-bounds read via a document that ends abruptly libxml2: external parameter entity loaded when entity substitution is disabled
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-chcr-8p34-ff32
|
Directory traversal vulnerability in include/db_conn.php in SpoonLabs Vivvo Article Management CMS 3.4 allows remote attackers to include and execute arbitrary local files via the root parameter.
|
[] | null | null | null | null | null |
|
CVE-2010-1069
|
SQL injection vulnerability in games/game.php in ProArcadeScript allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:proarcadescript:proarcadescript:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-q4p2-hx8c-p7gh
|
Multiple stack-based buffer overflows in Microsoft Office PowerPoint 2000 SP3 allow remote attackers to execute arbitrary code via a large amount of data associated with unspecified atoms in a PowerPoint file that triggers memory corruption, aka "Data Out of Bounds Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-9cwc-p4v5-qm42
|
SQL Injection vulnerability in Prestaddons flashsales 1.9.7 and before allows an attacker to run arbitrary SQL commands via the FsModel::getFlashSales method.
|
[] | null | 9.8 | null | null | null |
|
GHSA-2gv2-jvp7-24hf
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
GHSA-496j-2rq6-j6cc
|
Excessive Iteration in gRPC
|
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:Unbounded memory buffering in the HPACK parserUnbounded CPU consumption in the HPACK parserThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.The unbounded memory buffering bugs:The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse.gRPC’s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc…
|
[] | null | 7.5 | null | null | null |
GHSA-hqq7-2cj4-xmjf
|
There is a file upload XSS vulnerability in Generex CS141 below 2.06 version. The web application allows file uploading, making it possible to upload a file with HTML content. When HTML files are allowed, XSS payload can be injected into the uploaded file.
|
[] | null | 5.3 | null | null | null |
|
CVE-2024-6291
|
Use after free in Swiftshader in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-26954
|
WordPress ZooEffect plugin <= 1.11 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 1pluginjquery ZooEffect allows Reflected XSS. This issue affects ZooEffect: from n/a through 1.11.
|
[] | null | 7.1 | null | null | null |
GHSA-pqw9-r9pc-pw6x
|
In SWFTools 0.9.2, an out-of-bounds write of heap data can occur in the function png_load() in lib/png.c:755. This issue can be triggered by a malformed PNG file that is mishandled by png2swf. Attackers could exploit this issue for DoS; it might cause arbitrary code execution.
|
[] | null | null | 8.8 | null | null |
|
GHSA-rrv8-x3gg-xhjg
|
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
|
[] | null | null | null | null | null |
|
GHSA-278v-8427-jw24
|
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetMask param is not object. An attacker can send an HTTP request to trigger this vulnerability.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-21707
|
Special characters break path parsing in XML functions
|
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-6f22-6f94-wc44
|
PHP remote file include vulnerability in MarmaraWeb E-commerce allows remote attackers to execute arbitrary code via the page parameter to index.php.
|
[] | null | null | null | null | null |
|
GHSA-j98f-h9mx-xrxq
|
Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.05.06.00.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.