id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2007-5443
|
Multiple cross-site scripting (XSS) vulnerabilities in CMS Made Simple 1.1.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) the anchor tag and (2) listtags.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:1.1.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-87v3-hpq8-qpc6
|
The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.
|
[] | null | null | null | null | null |
|
CVE-2014-3136
|
Cross-site request forgery (CSRF) vulnerability in D-Link DWR-113 (Rev. Ax) with firmware before 2.03b02 allows remote attackers to hijack the authentication of administrators for requests that change the admin password via unspecified vectors.
|
[
"cpe:2.3:o:dlink:dwr-113_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-113:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-6p6v-7hf9-h7jf
|
The TCP Input module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted TCP packets, aka Bug IDs CSCuh33843 and CSCuj41494.
|
[] | null | null | null | null | null |
|
CVE-2022-33004
|
The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[
"cpe:2.3:a:pypi:beginner:*:*:*:*:*:pypi:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-qjxf-9xj6-wvf3
|
tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger "notification-spam" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of "a minimal check on email."
|
[] | null | null | null | null | null |
|
GHSA-x6r9-8x7w-8vg7
|
A SQL injection was discovered in /coreframe/app/admin/pay/admin/index.php in WUZHI CMS 4.1.0 via the index.php?m=pay&f=index&v=listing keyValue parameter.
|
[] | null | null | 9.8 | null | null |
|
GHSA-ffc7-qjxf-rgcr
|
A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 2.1 | 4.3 | null | null | null |
|
RHSA-2024:1325
|
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.1 release and security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: Open Redirect vulnerability in FORM authentication tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:6.0"
] | null | 7.5 | null | null | null |
CVE-2021-41378
|
Windows NTFS Remote Code Execution Vulnerability
|
Windows NTFS Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1916:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1348:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19041.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:arm64:*"
] | null | 7.8 | null | null | null |
GHSA-5w2q-hvhf-vrpc
|
The Cascading Style Sheets (CSS) implementation in Google Chrome before 12.0.742.91 does not properly restrict access to the visit history, which allows remote attackers to obtain sensitive information via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-29863
|
Medical Systems Co. Medisys Weblab Products v19.4.03 was discovered to contain a SQL injection vulnerability via the tem:statement parameter in the WSDL files.
|
[
"cpe:2.3:a:medisys:weblab:19.4.03:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2023:3579
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null | null |
CVE-2025-28380
|
A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter.
|
[] | null | 6.1 | null | null | null |
|
CVE-2021-3485
|
Improper Input Validation in Bitdefender Endpoint Security Tools for Linux
|
An Improper Input Validation vulnerability in the Product Update feature of Bitdefender Endpoint Security Tools for Linux allows a man-in-the-middle attacker to abuse the DownloadFile function of the Product Update to achieve remote code execution. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.2.21.155.
|
[
"cpe:2.3:a:bitdefender:endpoint_security_tools:*:*:*:*:*:linux:*:*"
] | null | 6.4 | null | null | null |
CVE-2024-10503
|
Klokan MapTiler tileserver-gl URL cross site scripting
|
A vulnerability was found in Klokan MapTiler tileserver-gl 2.3.1 and classified as problematic. This issue affects some unknown processing of the component URL Handler. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:klokantech:maptiler_tileserver_gl:2.3.1:*:*:*:-:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
CVE-2020-36607
|
Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag.
|
[
"cpe:2.3:a:feehi:feehicms:2.0.8:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-ghpp-72v8-mpmv
|
To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
|
[] | null | null | 6.5 | null | null |
|
CVE-2025-32623
|
WordPress PlainInventory plugin <= 3.1.9 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in plainware PlainInventory allows Stored XSS. This issue affects PlainInventory: from n/a through 3.1.9.
|
[] | null | 7.1 | null | null | null |
CVE-2018-0087
|
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281.
|
[
"cpe:2.3:o:cisco:asyncos:10.5.1-296:*:*:*:*:*:*:*"
] | null | null | 5.6 | 6.8 | null |
|
GHSA-vc6c-mcjw-3qvq
|
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.
|
[] | null | null | 9.8 | null | null |
|
CVE-2017-6225
|
Cross-site scripting (XSS) vulnerability in the web-based management interface of Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow remote attackers to execute arbitrary code or access sensitive browser-based information.
|
[
"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:fabric_os:8.0.1b1:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:fabric_os:8.0.2b1:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:fabric_os:8.1.0c1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-vcgm-w445-jvmq
|
Improper access control vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.4 allows an authenticated attacker to bypass access restriction and alter the data of Scheduler via unspecified vectors.
|
[] | null | 6.5 | null | null | null |
|
GHSA-hx7c-qpfq-xcrp
|
Cross-site Scripting in django-cms
|
Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
|
[] | 5.1 | 5.4 | null | null | null |
RHBA-2012:0013
|
Red Hat Bug Fix Advisory: libvirt bug fix and enhancement update
|
libvirt: unintended firewall port exposure after restarting libvirtd when defining a bridged forward-mode network
|
[
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null | null |
CVE-2019-12127
|
In ONAP OOM through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
|
[
"cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2007-5242
|
Unspecified vulnerability in (1) SYS$EI1000.EXE and (2) SYS$EI1000_MON.EXE in HP OpenVMS 8.3 and earlier allows remote attackers to cause a denial of service (machine crash) via an "oversize" packet, which is not properly discarded if "the device has no remaining buffers after receipt of the first buffer segment."
|
[
"cpe:2.3:o:hp:openvms:*:*:alpha:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:*:*:integrity:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-0212
|
Windows Hyper-V allows an elevation of privilege vulnerability when Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 fail to properly validate vSMB packet data, aka "Windows Hyper-V vSMB Elevation of Privilege Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7.6 | 5.4 | null |
|
CVE-2025-20243
|
Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability
|
A vulnerability in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability is due to improper validation of user-supplied input on an interface with VPN web services. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on an affected device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
|
[] | null | 8.6 | null | null | null |
GHSA-69fc-9h84-j223
|
In call of SliceProvider.java, there is a possible permissions bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-138441555
|
[] | null | null | null | null | null |
|
GHSA-7jpf-hrrg-gcj2
|
Incorrect access control in BW Broadcast TX600 (14980), TX300 (32990) (31448), TX150, TX1000, TX30, and TX50 Hardware Version: 2, Software Version: 1.6.0, Control Version: 1.0, AIO Firmware Version: 1.7 allows attackers to access log files and extract session identifiers to execute a session hijacking attack.
|
[] | null | 9.1 | null | null | null |
|
CVE-2021-23335
|
LDAP Injection
|
All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
|
[
"cpe:2.3:a:is-user-valid_project:is-user-valid:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
CVE-2022-27286
|
D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanNonLogin. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.
|
[
"cpe:2.3:o:dlink:dir-619_ax_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619_ax:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
RHSA-2021:1924
|
Red Hat Security Advisory: spice security update
|
spice: Client initiated renegotiation denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null | null |
CVE-2020-26815
|
SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability.
|
[
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):754:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad_\\(news_tile_application\\):755:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
|
GHSA-2f7q-533q-p67m
|
The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
|
[] | null | 8.8 | null | null | null |
|
GHSA-893r-c3v2-9hrw
|
Login Window in Apple Mac OS X before 10.8.3 does not prevent application launching with the VoiceOver feature, which allows physically proximate attackers to bypass authentication and make arbitrary System Preferences changes via unspecified use of the keyboard.
|
[] | null | null | null | null | null |
|
GHSA-45cf-cf6g-j6mm
|
A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets.
|
[] | null | null | null | null | null |
|
CVE-2025-21745
|
blk-cgroup: Fix class @block_class's subsystem refcount leakage
|
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: Fix class @block_class's subsystem refcount leakage
blkcg_fill_root_iostats() iterates over @block_class's devices by
class_dev_iter_(init|next)(), but does not end iterating with
class_dev_iter_exit(), so causes the class's subsystem refcount leakage.
Fix by ending the iterating with class_dev_iter_exit().
|
[] | null | 5.5 | null | null | null |
GHSA-6q2g-cq59-76q9
|
The OLE2 parsing in Norman Antivirus before 5.91.02 allows remote attackers to bypass the malware detection via a crafted DOC file, resulting from an "integer cast around".
|
[] | null | null | null | null | null |
|
GHSA-c6hf-65vv-x432
|
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by command injection vulnerability. Due to insufficient parameter validation check, an authorized user can exploit this vulnerability to take control of user router system.
|
[] | null | 8.8 | null | null | null |
|
GHSA-hg4g-3c74-gffm
|
A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The name of the patch is ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
GHSA-x762-73p7-hfjc
|
A vulnerability in the Simple Network Management Protocol (SNMP) punt handling function of Cisco cBR-8 Converged Broadband Routers could allow an authenticated, remote attacker to overload a device punt path, resulting in a denial of service (DoS) condition. This vulnerability is due to the punt path being overwhelmed by large quantities of SNMP requests. An attacker could exploit this vulnerability by sending a large number of SNMP requests to an affected device. A successful exploit could allow the attacker to overload the device punt path, resulting in a DoS condition.
|
[] | null | 7.7 | null | null | null |
|
GHSA-r8wq-qrxc-hmcm
|
ReDoS in LDAP schema parser
|
https://github.com/python-ldap/python-ldap/issues/424ImpactThe LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source.PatchesThe upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes.WorkaroundsAs a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical.References[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html)For more informationIf you have any questions or comments about this advisory:Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker
|
[] | null | 6.5 | null | null | null |
CVE-2024-4468
|
Salon booking system <= 9.9 - Missing Authorization
|
The Salon booking system plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions hooked into admin_init in all versions up to, and including, 9.9. This makes it possible for authenticated attackers with subscriber access or higher to modify plugin settings and view discount codes intended for other users.
|
[
"cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2022-44474
|
AEM Reflected XSS Arbitrary code execution
|
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2018-5465
|
A Session Fixation issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions.
|
[
"cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2019-19901
|
An issue was discovered in Backdrop CMS 1.13.x before 1.13.5 and 1.14.x before 1.14.2. It doesn't sufficiently filter output when displaying certain block descriptions created by administrators. An attacker could potentially craft a specialized description, then have an administrator execute scripting when configuring a layout, aka XSS. This issue is mitigated by the fact that the attacker would be required to have the permission to create custom blocks, which is typically an administrative task.
|
[
"cpe:2.3:a:backdropcms:backdrop_cms:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-g8hr-m8mg-wmfp
|
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of an affected system.
This vulnerability is due to insufficient access control for sensitive information that is written to an affected system. An attacker could exploit this vulnerability by accessing sensitive information that they are not authorized to access on an affected system. A successful exploit could allow the attacker to gain access to devices and other network management systems that they should not have access to.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2019:1400
|
Red Hat Security Advisory: qpid-proton security update
|
qpid-proton: TLS Man in the Middle Vulnerability
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.4 | null | null |
GHSA-r386-wm9g-qwpx
|
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
|
[] | null | null | null | null | null |
|
GHSA-8g7m-922w-m36f
|
SQL injection vulnerability in paidbanner.php in PHP Paid 4 Mail Script allows remote attackers to execute arbitrary SQL commands via the ID parameter.
|
[] | null | null | null | null | null |
|
CVE-2008-7081
|
userHandler.cgi in RaidSonic ICY BOX NAS firmware 2.3.2.IB.2.RS.1 allows remote attackers to bypass authentication and gain administrator privileges by setting the login parameter to admin. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:h:raidsonic:icy_box_nas:2.3.2.ib.2.rs.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2020-5353
|
The Dell Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale OneFS version 9.0.0 default configuration for Network File System (NFS) allows access to an 'admin' home directory. An attacker may leverage a spoofed Unique Identifier (UID) over NFS to rewrite sensitive files to gain administrative access to the system.
|
[
"cpe:2.3:a:dell:emc_isilon_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:9.0.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-hfr2-452h-93q6
|
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certificate.
|
[] | null | null | null | null | null |
|
GHSA-xvfh-486p-jr58
|
The Screen Lock implementation in Apple Mac OS X before 10.9 does not immediately accept Keychain Status menu Lock Screen commands, and instead incorrectly relies on a certain timeout setting, which allows physically proximate attackers to obtain sensitive information by reading a screen that should have transitioned into the locked state.
|
[] | null | null | null | null | null |
|
GHSA-4f6p-cv97-w83q
|
Cisco Nexus OS (aka NX-OS) 4.2 and 5.0 and Cisco Unified Computing System with software 1.4 and 2.0 do not properly restrict command-line options, which allows local users to gain privileges via unspecified vectors, aka Bug IDs CSCtf40008, CSCtg18363, CSCtr44645, CSCts10195, and CSCts10188.
|
[] | null | null | null | null | null |
|
CVE-2010-1341
|
SQL injection vulnerability in index.php in Systemsoftware Community Black Forum allows remote attackers to execute arbitrary SQL commands via the s_flaeche parameter.
|
[
"cpe:2.3:a:systemsoftware:community_black_forum:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wwv5-pfx5-r5w7
|
Authentication credentials leakage vulnerability in Hitachi Ops Center Common Services within Hitachi Ops Center OVA.This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.3-00; Hitachi Ops Center OVA: from 10.9.3-00 before 11.0.2-01.
|
[] | null | 7.1 | null | null | null |
|
CVE-2012-2236
|
SQL injection vulnerability in users.php in PHP Gift Registry 1.5.5 allows remote authenticated users to execute arbitrary SQL commands via the userid parameter in an edit action.
|
[
"cpe:2.3:a:ryan_walberg:php_gift_registry:1.5.5:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-wmqm-x8vm-v6mh
|
SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.
|
[] | null | null | null | null | null |
|
GHSA-q44j-p422-qjh5
|
In the Linux kernel, the following vulnerability has been resolved:bpf: Reject %p% format string in bprintf-like helpersstatic const char fmt[] = "%p%";
bpf_trace_printk(fmt, sizeof(fmt));The above BPF program isn't rejected and causes a kernel warning at
runtime:This happens because bpf_bprintf_prepare skips over the second %,
detected as punctuation, while processing %p. This patch fixes it by
not skipping over punctuation. %\x00 is then processed in the next
iteration and rejected.
|
[] | null | null | null | null | null |
|
RHSA-2021:2262
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null | null |
CVE-2014-0033
|
org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.
|
[
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vp48-vfcc-j7mg
|
Windows Network File System Information Disclosure Vulnerability
|
[] | null | 5.5 | null | null | null |
|
CVE-2022-2178
|
XSS in Saysis' Starcities
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saysis Computer Starcities allows Cross-Site Scripting (XSS).This issue affects Starcities: before 1.1.
|
[
"cpe:2.3:a:saysis:starcities:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2023-46728
|
SQUID-2021:8 Denial of Service in Gopher gateway
|
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
|
[
"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-j4rf-7357-f4cg
|
Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer
|
ImpactThere is an ext4 use-after-free flaw described in CVE-2022-1184 that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.BackgroundHistorically there have been many CVEs published for extfs and a smaller number for squashfs, including serious use-after-free and buffer overrun vulnerabilities, that are scored as "Moderate" or "Low" impact only because unprivileged users were assumed to not have write access to the raw data. Because of those ratings, vendors treat such CVEs as low urgency and either delay a patch until their next major release or never patch older but still supported operating systems at all. Many Linux distributions automatically mount user-writable USB-drive volumes, but those are considered low risk because they require physical access to the machine. However, since setuid-root installations of Apptainer by default allow all users to mount any extfs (specifically, ext3, which is implemented by the ext4 driver) and squashfs filesystem using kernel drivers even though the users have write access to the raw data, the setuid-root installations raise the severity of such unpatched CVEs.CVE-2022-1184 is currently such an unpatched CVE, at least on the above listed operating systems. The descriptions from the operating system vendors about the CVE (referenced below) are incomplete, saying only that it allows a local attacker with user privilege to cause a denial of service. Normally users would not be able to cause it because they cannot modify the filesystem image, and normally vulnerabilities that involve kernel memory corruption by unprivileged users are considered high severity even when there is not yet a known privilege escalation because someone with sufficient kernel knowledge can usually turn such a corruption into a privilege escalation.Red Hat did not list RHEL7 as vulnerable, but they also did not list it as unaffected, and testing confirmed that a filesystem image could be corrupted to get past the check inserted into the filesystem driver to fix the vulnerability (patches linked below).All published squashfs CVEs have been patched in currently supported major operating systems.PatchesApptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid "rootless" mode using fuse2fs.WorkaroundsThese workarounds are possible:Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf. This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts. (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.)Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths. (The option `allow container extfs = no` disallows mounting extfs overlay files but does not disallow mounting of extfs overlay partitions inside SIF files, so it does not help work around the problem.)Referenceshttps://nvd.nist.gov/vuln/detail/CVE-2022-1184
https://access.redhat.com/security/cve/cve-2022-1184
https://security-tracker.debian.org/tracker/CVE-2022-1184
https://ubuntu.com/security/CVE-2022-1184
Kernel patches for CVE-2022-1184:
https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233
https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201Addendum 30 May 2023New information has become available: many ext4 filesytem vulnerabilities similar to the one in CVE-2022-1184 continue to be found, and most of them do not ever have a CVE assigned. The way to locate them is to search for "syzbot" in linux kernel commit messages under fs/ext4. "syzbot" is a public automated system for finding kernel bugs. Especially when syzbot reports are labeled "KASAN" (Kernel Address Sanitizer) and especially if they involve memory corruption including "use after free", "out of bounds", or "user-memory-access", they are vulnerabilities that can potentially be turned into privilege escalation when an unprivileged user has write access to the underlying data.In particular there are two such commits from this month, May 2023, referenced below. They both have commit messages describing a situation of write access to the underlying data while the kernel has that data mounted as a filesystem. These commits have been backported to currently maintained kernel lines in versions 4.19.293 and 5.4.243, but since they are considered moderate severity, most common OS distributions do not include them immediately. For example since RHEL9.2 was recently announced, they are not likely to be available in RHEL9 until 9.3 is released in about another 6 months. Therefore if system administrators want to be protected against these vulnerabilities while still allowing ext4 filesystem mounts through setuid-root apptainer, they should watch for these types of commits and whenever such commits are released the administrators should update to the latest currently maintained kernel version (bypassing their OS vendor's distribution) and reboot.https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303
https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f
https://lwn.net/Articles/932137/
https://lwn.net/Articles/932136/
|
[] | null | 7 | null | null | null |
GHSA-xqxx-r4pj-7cv5
|
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the (1) query string to (a) announcements/messages.php; (b) lostPassword.php and (c) profile.php in auth/; (d) calendar/myagenda.php; (e) group/group.php; (f) learningPath.php, (g) learningPathList.php, and (h) module.php in learnPath/; (i) phpbb/index.php; (j) courseLog.php, (k) course_access_details.php, (l) delete_course_stats.php, (m) userLog.php, and (n) user_access_details.php in tracking/; (o) user/user.php; and (p) user/userInfo.php; the (2) view parameter to (q) tracking/courseLog.php; and the (3) toolId parameter to (r) tracking/toolaccess_details.php. NOTE: this may overlap CVE-2006-3257 and CVE-2005-1374.
|
[] | null | null | null | null | null |
|
CVE-2013-6707
|
Memory leak in the connection-manager implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1(.3) and earlier allows remote attackers to cause a denial of service (multi-protocol management outage) by making multiple management session requests, aka Bug ID CSCug33233.
|
[
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-4629
|
Product Slider for WooCommerce < 2.6.4 - Contributor+ Stored XSS in Shortcode
|
The Product Slider for WooCommerce WordPress plugin before 2.6.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:shapedplugin:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-pp4j-p7qm-hvr4
|
Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
|
[] | null | 8.2 | null | null | null |
|
CVE-2025-49216
|
An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations.
|
[
"cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-8j8f-gv6j-frjv
|
Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
|
[] | null | null | null | null | null |
|
CVE-2010-0074
|
Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 7.0SP7, 8.1SP6, 9.0, 9.1, 9.2MP3, 10.0MP2, and 10.3.1 allows remote attackers to affect availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.0:mp2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2007-4695
|
Unspecified "input validation" vulnerability in WebCore in Apple Mac OS X 10.4 through 10.4.10 allows remote attackers to modify form field values via unknown vectors related to file uploads.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-74hg-7r85-vvw3
|
In the Linux kernel, the following vulnerability has been resolved:PCI: aardvark: Fix kernel panic during PIO transferTrying to start a new PIO transfer by writing value 0 in PIO_START register
when previous transfer has not yet completed (which is indicated by value 1
in PIO_START) causes an External Abort on CPU, which results in kernel
panic:To prevent kernel panic, it is required to reject a new PIO transfer when
previous one has not finished yet.If previous PIO transfer is not finished yet, the kernel may issue a new
PIO request only if the previous PIO transfer timed out.In the past the root cause of this issue was incorrectly identified (as it
often happens during link retraining or after link down event) and special
hack was implemented in Trusted Firmware to catch all SError events in EL3,
to ignore errors with code 0xbf000002 and not forwarding any other errors
to kernel and instead throw panic from EL3 Trusted Firmware handler.Links to discussion and patches about this issue:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50
https://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/
https://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/
https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541But the real cause was the fact that during link retraining or after link
down event the PIO transfer may take longer time, up to the 1.44s until it
times out. This increased probability that a new PIO transfer would be
issued by kernel while previous one has not finished yet.After applying this change into the kernel, it is possible to revert the
mentioned TF-A hack and SError events do not have to be caught in TF-A EL3.
|
[] | null | 5.5 | null | null | null |
|
GHSA-gc5h-6jx9-q2qh
|
eZ Platform Admin UI vulnerable to DOM-based Cross-site Scripting in file upload widget
|
ImpactThe file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file. The fix ensures XSS is escaped.PatchesSee "Patched versions". Commit: https://github.com/ezsystems/ezplatform-admin-ui/commit/7a9f991b200fa5a03d49cd07f50577c8bc90a30bWorkaroundsNone.Referenceshttps://developers.ibexa.co/security-advisories/ibexa-sa-2024-004-dom-based-xss-in-file-uploadhttps://github.com/ezsystems/ezplatform-admin-ui/commit/7a9f991b200fa5a03d49cd07f50577c8bc90a30bhttps://github.com/ibexa/admin-ui/security/advisories/GHSA-qm44-wjm2-pr59CreditThis vulnerability was discovered and reported to Ibexa by Alec Romano: https://github.com/4rdr
We thank them for reporting it responsibly to us.How to report security issues:
https://doc.ibexa.co/en/latest/infrastructure_and_maintenance/security/reporting_issues/
|
[] | 4.8 | 5.4 | null | null | null |
CVE-2012-4543
|
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script.
|
[
"cpe:2.3:a:redhat:certificate_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:certificate_system:8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2015-4189
|
Cross-site request forgery (CSRF) vulnerability in Cisco Data Center Analytics Framework (DCAF) 1.4 allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCun26807.
|
[
"cpe:2.3:a:cisco:data_center_analytics_framework:1.4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
ICSA-19-024-01
|
Advantech WebAccess/SCADA
|
An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data.CVE-2019-6519 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information.CVE-2019-6521 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). The software does not properly sanitize its inputs for SQL commands.CVE-2019-6523 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 5.3 | null | null |
GHSA-qm29-hj4p-276m
|
In the Linux kernel, the following vulnerability has been resolved:io_uring/uring_cmd: unconditionally copy SQEs at prep timeThis isn't generally necessary, but conditions have been observed where
SQE data is accessed from the original SQE after prep has been done and
outside of the initial issue. Opcode prep handlers must ensure that any
SQE related data is stable beyond the prep phase, but uring_cmd is a bit
special in how it handles the SQE which makes it susceptible to reading
stale data. If the application has reused the SQE before the original
completes, then that can lead to data corruption.Down the line we can relax this again once uring_cmd has been sanitized
a bit, and avoid unnecessarily copying the SQE.
|
[] | null | null | null | null | null |
|
CVE-2015-5946
|
Incomplete blacklist vulnerability in SuiteCRM 7.2.2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension.
|
[
"cpe:2.3:a:sugarcrm:sugarcrm:6.5.22:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
GHSA-gj46-f2mj-gph9
|
NTSC-CRT 2.2.1 has an integer overflow and out-of-bounds write in loadBMP in bmp_rw.c because a file's width, height, and BPP are not validated. NOTE: the vendor's perspective is "this main application was not intended to be a well tested program, it's just something to demonstrate it works and for the user to see how to integrate it into their own programs."
|
[] | null | 7.5 | null | null | null |
|
GHSA-34mg-j6f6-fj36
|
Cross-site scripting (XSS) vulnerability in the BE User Switch (beuserswitch) extension 0.0.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
RHSA-2002:088
|
Red Hat Security Advisory: : Updated ethereal packages are available
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null | null |
GHSA-wjfq-88q2-r34j
|
Unhandled exception when decoding form response JSON
|
ImpactWhen handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash.Patches56fe71d939c38fe14e18a31a673a9331bcc0e4caWorkaroundsA plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`.Note that this requires copying the body of the function to a plugin, since the function is currently private.For more informationIf you have any questions or comments about this advisory:Email us at [team@pmmp.io](mailto:team@pmmp.io)
|
[] | null | 7.5 | null | null | null |
GHSA-xcfw-vq92-pfw7
|
Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
|
[] | null | null | null | null | null |
|
ICSA-24-317-01
|
Subnet Solutions PowerSYSTEM Center
|
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
|
[] | null | 9.8 | null | null | null |
GHSA-r872-9mqq-9xpp
|
mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.
|
[] | null | null | null | null | null |
|
CVE-2020-15219
|
SQL query displayed on portal error
|
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, when a download error is triggered in the user portal, an SQL query is displayed to the user. This is fixed in versions 2.7.2 and 3.0.0.
|
[
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:alpha:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2016-9165
|
The get_sessions servlet in CA Unified Infrastructure Management (formerly CA Nimsoft Monitor) before 8.5 and CA Unified Infrastructure Management Snap (formerly CA Nimsoft Monitor Snap) allows remote attackers to obtain active session ids and consequently bypass authentication or gain privileges via unspecified vectors.
|
[
"cpe:2.3:a:ca:unified_infrastructure_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:unified_infrastructure_management_snap:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
ICSA-22-249-04
|
Hitachi Energy TXpert Hub CoreTec 4
|
A vulnerability in the application authentication and authorization mechanism in the affected product depends on a token validation of the session identifier. The vulnerability allows an unauthorized modified message to be executed in the server, enabling an attacker to change an existing user 's password, and gain authorized access into the system.CVE-2021-35530 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L). An Improper Input Validation vulnerability in a particular configuration setting field of the affected product allows an attacker, who has access to an authorized user with ADMIN or ENGINEER role rights, to inject an operating system (OS) command; this command will then be executed by the system.CVE-2021-35531 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L). A vulnerability exists in the file upload validation component of the affected product. The vulnerability allows an attacker to gain access to the system and obtain an account with sufficient privilege to then upload a malicious firmware to the product.CVE-2021-35532 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L).
|
[] | null | null | 6 | null | null |
CVE-2009-2665
|
The nsDocument::SetScriptGlobalObject function in content/base/src/nsDocument.cpp in Mozilla Firefox 3.5.x before 3.5.2, when certain add-ons are enabled, does not properly handle a Link HTTP header, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted web page, related to an incorrect security wrapper.
|
[
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-qvvp-m5ff-gf7p
|
The default configuration of the NETGEAR ProSafe FVS318N firewall enables web-based administration on the WAN interface, which allows remote attackers to establish an HTTP connection and possibly have unspecified other impact via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-2vjg-mqpc-fcrj
|
phpBB 2.0.17 and earlier allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GET/POST/COOKIE (GPC) variable and a GLOBALS[] variable with the same name, which causes phpBB to unset the GLOBALS[] variable but not the GPC variable.
|
[] | null | null | null | null | null |
|
CVE-2023-33123
|
A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visualization V13.2 (All versions < V13.2.0.13), Teamcenter Visualization V13.3 (All versions < V13.3.0.10), Teamcenter Visualization V14.0 (All versions < V14.0.0.6), Teamcenter Visualization V14.1 (All versions < V14.1.0.8), Teamcenter Visualization V14.2 (All versions < V14.2.0.3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2019-0945
|
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0946, CVE-2019-0947.
|
[
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365:-:*:*:*:proplus:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2022-31661
|
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two privilege escalation vulnerabilities. A malicious actor with local access can escalate privileges to 'root'.
|
[
"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:one_access:21.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:one_access:21.08.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:access_connector:21.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:access_connector:21.08.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:access_connector:22.05:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:19.03.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-wj8j-58jx-v347
|
SQL injection vulnerability in inc/rubriques.php in SPIP 1.8 before 1.8.3b, 1.9 before 1.9.2g, and 2.0 before 2.0.2 allows remote attackers to execute arbitrary SQL commands via the ID parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.