id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2019-8285
|
Kaspersky Lab Antivirus Engine version before 04.apr.2019 has a heap-based buffer overflow vulnerability that potentially allow arbitrary code execution
|
[
"cpe:2.3:a:kaspersky:antivirus_engine:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-vvfq-8hwr-qm4m
|
Nokogiri updates packaged libxml2 to 2.13.6 to resolve CVE-2025-24928 and CVE-2024-56171
|
SummaryNokogiri v1.18.3 upgrades its dependency libxml2 to [v2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6).libxml2 v2.13.6 addresses:CVE-2025-24928described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/847CVE-2024-56171described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/828ImpactCVE-2025-24928Stack-buffer overflow is possible when reporting DTD validation errors if the input contains a long (~3kb) QName prefix.CVE-2024-56171Use-after-free is possible during validation against untrusted XML Schemas (.xsd) and, potentially, validation of untrusted documents against trusted Schemas if they make use of `xsd:keyref` in combination with recursively defined types that have additional identity constraints.
|
[] | null | null | null | null | null |
GHSA-px9x-jp5p-m4g4
|
In the Linux kernel, the following vulnerability has been resolved:alloc_tag: allocate percpu counters for module tags dynamicallyWhen a module gets unloaded it checks whether any of its tags are still in
use and if so, we keep the memory containing module's allocation tags
alive until all tags are unused. However percpu counters referenced by
the tags are freed by free_module(). This will lead to UAF if the memory
allocated by a module is accessed after module was unloaded.To fix this we allocate percpu counters for module allocation tags
dynamically and we keep it alive for tags which are still in use after
module unloading. This also removes the requirement of a larger
PERCPU_MODULE_RESERVE when memory allocation profiling is enabled because
percpu memory for counters does not need to be reserved anymore.
|
[] | null | null | null | null | null |
|
GHSA-4wh7-wjq8-qr93
|
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-46603
|
An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload.
|
[] | null | 7.5 | null | null | null |
|
GHSA-jv3g-j58f-9mq9
|
JOSE vulnerable to resource exhaustion via specifically crafted JWE
|
The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` ([PBES2 Count](https://www.rfc-editor.org/rfc/rfc7518.html#section-4.8.1.2)), which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password brute-force and dictionary attacks more expensive.This makes the PBES2 algorithms unsuitable for situations where the JWE is coming from an untrusted source: an adversary can intentionally pick an extremely high PBES2 Count value, that will initiate a CPU-bound computation that may take an unreasonable amount of time to finish.ImpactUnder certain conditions (see below) it is possible to have the user's environment consume unreasonable amount of CPU time.Affected usersThe impact is limited only to users utilizing the JWE decryption APIs with symmetric secrets to decrypt JWEs from untrusted parties who do not limit the accepted JWE Key Management Algorithms (`alg` Header Parameter) using the `keyManagementAlgorithms` (or `algorithms` in v1.x) decryption option or through other means.The PBKDF2-based JWE Key Management Algorithm Identifiers are`PBES2-HS256+A128KW``PBES2-HS384+A192KW``PBES2-HS512+A256KW`e.g.You are NOT affected if any of the following applies to youYour code does not use the JWE APIsYour code only produces JWE tokensYour code only decrypts JWEs using an asymmetric JWE Key Management Algorithm (this means you're providing an asymmetric key object to the JWE decryption API)Your code only accepts JWEs produced by trusted sourcesYour code limits the accepted JWE Key Management Algorithms using the `keyManagementAlgorithms` decryption option not including any of the PBKDF2-based JWE key management algorithmsPatches`v1.28.2`, `v2.0.6`, `v3.20.4`, and `v4.9.2` releases limit the maximum PBKDF2 iteration count to `10000` by default. It is possible to adjust this limit with a newly introduced `maxPBES2Count` decryption option.WorkaroundsAll users should be able to upgrade given all stable semver major release lines have had new a patch release introduced which limits the PBKDF2 iteration count to `10000` by default. This removes the ability to craft JWEs that would consume unreasonable amount of CPU time.If users are unable to upgrade their required library version they have two options depending on whether they expect to receive JWEs using any of the three PBKDF2-based JWE key management algorithms.they can use the `keyManagementAlgorithms` decryption option to disable accepting PBKDF2 altogetherthey can inspect the JOSE Header prior to using the decryption API and limit the PBKDF2 iteration count (`p2c` Header Parameter)For more informationIf you have any questions or comments about this advisory:Open an discussion in the project's [repository](https://github.com/panva/jose/discussions/new?category=q-a&title=GHSA-jv3g-j58f-9mq9%20advisory%20question)Email me at [panva.ip@gmail.com](mailto:panva.ip@gmail.com)
|
[] | null | 5.3 | null | null | null |
GHSA-cq86-hpwc-gjqj
|
qiomkfile in the Quick I/O for Database feature in Symantec Veritas File System (VxFS) on HP-UX, and before 5.0 MP3 on Solaris, Linux, and AIX, does not initialize filesystem blocks during creation of a file, which allows local users to obtain sensitive information by creating and then reading files.
|
[] | null | null | null | null | null |
|
CVE-2023-42111
|
PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22138.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.1.0.380:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2001-1003
|
Respondus 1.1.2 for WebCT uses weak encryption to remember usernames and passwords, which allows local users who can read the WEBCT.SVR file to decrypt the passwords and gain additional privileges.
|
[
"cpe:2.3:a:webct:respondus:1.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2023-44393
|
Piwigo Reflected XSS vulnerability
|
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue.
|
[
"cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:14.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:14.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:14.0.0:beta3:*:*:*:*:*:*"
] | null | 9.3 | null | null | null |
CVE-2018-5469
|
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.
|
[
"cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-f357-m44q-68mm
|
In the Linux kernel, the following vulnerability has been resolved:s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFsWith commit bcb5d6c76903 ("s390/pci: introduce lock to synchronize state
of zpci_dev's") the code to ignore power off of a PF that has child VFs
was changed from a direct return to a goto to the unlock and
pci_dev_put() section. The change however left the existing pci_dev_put()
untouched resulting in a doubple put. This can subsequently cause a use
after free if the struct pci_dev is released in an unexpected state.
Fix this by removing the extra pci_dev_put().
|
[] | null | null | null | null | null |
|
GHSA-6g8w-2whx-r7rc
|
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-54075
|
mdc vulnerable to XSS in markdown rendering bypassing HTML filter. (N°4)
|
MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue.
|
[] | null | 8.3 | null | null | null |
GHSA-876p-68m9-3fh8
|
There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Document Creator v1.0.
|
[] | null | 6.1 | null | null | null |
|
CVE-2017-4015
|
Clickjacking vulnerability in the server in McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote authenticated users to inject arbitrary web script or HTML via HTTP response header.
|
[
"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*"
] | null | 4.5 | null | 3.5 | null |
|
GHSA-vmv9-679j-8xv5
|
librpc.dll in nsrexecd in EMC NetWorker before 7.5 SP4, 7.5.3.x before 7.5.3.5, and 7.6.x before 7.6.1.2 does not properly mitigate the possibility of a spoofed localhost source IP address, which allows remote attackers to (1) register or (2) unregister RPC services, and consequently cause a denial of service or obtain sensitive information from interprocess communication, via crafted UDP packets containing service commands.
|
[] | null | null | null | null | null |
|
CVE-2004-1187
|
Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.
|
[
"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-pv7f-h3w8-w3jh
|
Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials.
|
[] | null | 5.9 | null | null | null |
|
CVE-2022-25751
|
A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices do not properly validate the HTTP headers of incoming requests. This could allow an unauthenticated remote attacker to crash affected devices.
|
[
"cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2017-7424
|
A Path Traversal (CWE-22) vulnerability in esfadmingui in Micro Focus Enterprise Developer and Enterprise Server 2.3, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allows remote authenticated users to download arbitrary files from a system running the product, if this component is configured. Note esfadmingui is not enabled by default.
|
[
"cpe:2.3:a:microfocus:enterprise_developer:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:enterprise_developer:2.3:update1:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:enterprise_developer:2.3:update2:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:enterprise_server:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:enterprise_server:2.3:update1:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:enterprise_server:2.3:update2:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
CVE-2019-11833
|
fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2023-4452
|
Web Server Buffer Overflow Vulnerability
|
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.
|
[
"cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-7g4c-492w-552h
|
** DISPUTED ** The libfsntfs_mft_entry_read_attributes function in libfsntfs_mft_entry.c in libfsntfs through 2018-04-20 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted ntfs file. NOTE: the vendor has disputed this as described in libyal/libfsntfs issue 8 on GitHub.
|
[] | null | null | 5.5 | null | null |
|
GHSA-p493-cq87-mf78
|
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | 5.3 | null | null | null |
|
GHSA-48cv-fcjc-63mx
|
SQL injection vulnerability in admin/login.php in Chipmunk Guestbook allows remote attackers to execute arbitrary SQL commands and bypass login authentication via the User name.
|
[] | null | null | null | null | null |
|
CVE-2022-43527
|
Multiple vulnerabilities within the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
|
[
"cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*",
"cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*",
"cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*",
"cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2025-27414
|
MinIO SFTP authentication bypass due to improperly trusted SSH key
|
MinIO is a high performance object storage. Starting in RELEASE.2024-06-06T09-36-42Z and prior to
RELEASE.2025-02-28T09-55-16Z, a bug in evaluating the trust of the SSH key used in an SFTP connection to MinIO allows authentication bypass and unauthorized data access. On a MinIO server with SFTP access configured and using LDAP as an external identity provider, MinIO supports SSH key based authentication for SFTP connections when the user has the `sshPublicKey` attribute set in their LDAP server. The server trusts the client's key only when the public key is the same as the `sshPublicKey` attribute. Due to the bug, when the user has no `sshPublicKey` property in LDAP, the server ends up trusting the key allowing the client to perform any FTP operations allowed by the MinIO access policies associated with the LDAP user (or any of their groups). Three requirements must be met in order to exploit the vulnerability. First, the MinIO server must be configured to allow SFTP access and use LDAP as an external identity provider. Second, the attacker must have knowledge of an LDAP username that does not have the `sshPublicKey` property set. Third, such an LDAP username or one of their groups must also have some MinIO access policy configured. When this bug is successfully exploited, the attacker can perform any FTP operations (i.e. reading, writing, deleting and listing objects) allowed by the access policy associated with the LDAP user account (and their groups). Version 1.2.0 fixes the issue.
|
[] | 4.6 | null | null | null | null |
ICSA-25-051-03
|
Carrier Block Load
|
The vulnerability could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges.
|
[] | null | 7.8 | null | null | null |
GHSA-6367-p3v8-7mgw
|
google-cloudstorage-commands Command Injection vulnerability
|
A command injection vulnerability affects all versions of the deprecated package google-cloudstorage-commands.
|
[] | null | 9.8 | null | null | null |
GHSA-f62v-g6wp-2qc2
|
OpenGL in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2015-7064.
|
[] | null | null | null | null | null |
|
GHSA-gr95-g7vq-h76h
|
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiEscape in which the software uses a sequential operation to read from or write to a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer, which may lead to denial of service or escalation of privileges.
|
[] | null | null | 7.8 | null | null |
|
ICSA-24-256-16
|
Siemens Third Party Component in SICAM and SITIPE Products
|
Triangle Microworks TMW IEC 61850 Client source code libraries before 12.2.0 lack a buffer size check when processing received messages. The resulting buffer overflow can cause a crash, resulting in a denial of service.
|
[] | null | 8.2 | null | null | null |
GHSA-4xqq-gqgr-76cf
|
IBM General Parallel File System (GPFS) 3.5 before 3.5.0.29 efix 6 and 4.1.1 before 4.1.1.4 efix 9, when the Spectrum Scale GUI is used with DB2 on Linux, UNIX and Windows, allows remote authenticated users to obtain sensitive information via unspecified vectors, as demonstrated by discovering ADMIN passwords.
|
[] | null | null | 6.5 | null | null |
|
CVE-2015-1616
|
SQL injection vulnerability in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated ePO users to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:mcafee:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2012-1467
|
Multiple directory traversal vulnerabilities in the iBrowser plugin library, as used in Open Journal Systems before 2.3.7, allow remote authenticated users to (1) delete or (2) rename arbitrary files via a .. (dot dot) in the param parameter to lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php.
|
[
"cpe:2.3:a:pkp:open_journal_systems:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2024-38136
|
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
|
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
CVE-2016-1000282
|
Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.
|
[
"cpe:2.3:a:haraka_project:haraka:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-vhr4-h7vg-cgj6
|
A vulnerability in Cisco IOS ROM Monitor (ROMMON) Software for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, local attacker to bypass Cisco Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to the presence of a hidden command in the affected software. An attacker could exploit this vulnerability by connecting to an affected device via the console, forcing the device into ROMMON mode, and writing a malicious pattern to a specific memory address on the device. A successful exploit could allow the attacker to bypass signature validation checks by Cisco Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco.
|
[] | null | null | 6.8 | null | null |
|
CVE-2024-36573
|
almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component.
|
[
"cpe:2.3:a:almela:obx:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2003-0085
|
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.
|
[
"cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xjqr-wxf9-h6mr
|
An OS command injection vulnerability exists in the ys_thirdparty system_user_script functionality of Milesight UR32L v32.3.0.5. A specially crafted series of network requests can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.
|
[] | null | 7.2 | null | null | null |
|
CVE-2013-7196
|
static/ajax.php in PHPFox 3.7.3, 3.7.4, and 3.7.5 allows remote authenticated users to bypass intended "Only Me" restrictions and comment on a private publication via a request with a modified val[item_id] parameter for the publication.
|
[
"cpe:2.3:a:phpfox:phpfox:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpfox:phpfox:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpfox:phpfox:3.7.5:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
GHSA-w244-m45p-g2fh
|
Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
|
[] | null | 8.8 | null | null | null |
|
GHSA-p5jf-rf9m-p26h
|
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
|
[] | null | 7.8 | null | null | null |
|
GHSA-g4p8-3q3x-j993
|
Missing Authorization vulnerability in Ashish AI Tools allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AI Tools: from n/a through 4.0.7.
|
[] | null | 6.5 | null | null | null |
|
GHSA-g5x7-p429-mq3p
|
An improper input validation allows an unauthenticated attacker to achieve remote command execution on the affected PAM system by sending a specially crafted HTTP request.
|
[] | 9.4 | null | null | null | null |
|
RHSA-2016:1865
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null | null |
GHSA-x785-m5vp-jc3c
|
The report-generation web interface in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and read report or status information, by visiting an unspecified web page.
|
[] | null | null | null | null | null |
|
CVE-2015-1404
|
Cross-site scripting (XSS) vulnerability in the Content Rating Extbase extension 2.0.3 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:content_rating_extbase_project:content_rating_extbase:*:*:*:*:*:typo3:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-15342
|
The Tecno Camon iAir 2 Plus Android device with a build fingerprint of TECNO/H622/TECNO-ID3k:8.1.0/O11019/E-180914V83:user/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.0.11). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands via shell script to be executed as the system user that are triggered by writing an attacker-selected message to the logcat log. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.
|
[
"cpe:2.3:o:tecno-mobile:camon_iair_2\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tecno-mobile:camon_iair_2\\+:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-7jm5-cpcx-cgg5
|
Unspecified vulnerability in Oracle MySQL 5.7.11 and earlier allows local users to affect availability via vectors related to Partition.
|
[] | null | null | 5.5 | null | null |
|
GHSA-m58f-5mcm-c967
|
Cross-site scripting (XSS) vulnerability in the charts module in Greenbone Security Assistant (GSA) 6.x before 6.0.8 allows remote attackers to inject arbitrary web script or HTML via the aggregate_type parameter in a get_aggregate command to omp.
|
[] | null | null | 6.1 | null | null |
|
GHSA-5pj7-f4q8-vv7g
|
Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
RHSA-2016:0100
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: underflow read in png_check_keyword() OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 8.8 | null | null |
GHSA-xj35-rhxx-w86c
|
A CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability exists in PowerLogic PM55xx, PowerLogic PM8ECC, PowerLogic EGX100 and PowerLogic EGX300 (see security notification for version infromation) that could allow an attacker administrator level access to a device.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2024:2079
|
Red Hat Security Advisory: git-lfs security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
CVE-2021-25317
|
cups: ownership of /var/log/cups allows the lp user to create files as root
|
A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.
|
[
"cpe:2.3:a:suse:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
CVE-2024-2929
|
Rockwell Automation Arena Simulation Vulnerable To Memory Corruption
|
A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
|
[
"cpe:2.3:a:rockwellautomation:arena_simulation_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2021-21355
|
Unrestricted File Upload in Form Framework
|
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 8.7.40, 9.5.25, 10.4.14, 11.1.1, due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, _UploadedFileReferenceConverter_ transforming uploaded files into proper FileReference domain model objects handles possible file uploads for other extensions as well - given those extensions use the Extbase MVC framework, make use of FileReference items in their direct or inherited domain model definitions and did not implement their own type converter. In case this scenario applies, _UploadedFileReferenceConverter_ accepts any file mime-type and persists files in the default location. In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information. No authentication is required to exploit this vulnerability. This is fixed in versions 8.7.40, 9.5.25, 10.4.14, 11.1.1.
|
[
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
CVE-2006-2757
|
Cross-site scripting (XSS) vulnerability in Chipmunk guestbook allows remote attackers to inject arbitrary web script or HTML via the (1) start parameter in (a) index.php; (2) forumID parameter in index.php, (b) newtopic.php, and (c) reply.php; and (3) ID parameter to (d) edit.php.
|
[
"cpe:2.3:a:chipmunk_scripts:chipmunk_guestbook:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-f9qj-7gh3-mhj4
|
run-terraform allows for RCE via terraform plan
|
Impact_What kind of vulnerability is it? Who is impacted?_
All users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow.Patches_Has the problem been patched? What versions should users upgrade to?_
Upgrade to at least 2.7.5 to resolve the issue.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Until you are able to upgrade, make sure to review any PRs from exernal users for malicious payloads before allowing them to trigger a build.For more informationIf you have any questions or comments about this advisory:Open an issue in [kartverket/github-workflows](https://github.com/kartverket/github-workflows)
|
[] | null | 8.8 | null | null | null |
CVE-2008-0379
|
Race condition in the Enterprise Tree ActiveX control (EnterpriseControls.dll 11.5.0.313) in Crystal Reports XI Release 2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SelectedSession method, which triggers a buffer overflow.
|
[
"cpe:2.3:a:businessobjects:crystal_reports_xi:r2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-496c-rr8h-gr3w
|
illumos illumos-gate before 676abcb has a stack buffer overflow in /dev/net, leading to privilege escalation via a stat on a long file name in /dev/net.
|
[] | null | 7.8 | null | null | null |
|
GHSA-992x-5q5j-jmp5
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Fastline Media LLC Assistant – Every Day Productivity Apps.This issue affects Assistant – Every Day Productivity Apps: from n/a through 1.4.9.1.
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-33591
|
User Registration & Login and User Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/search-result.php.
|
[
"cpe:2.3:a:user_registration_\\&_login_and_user_management_system_project:user_registration_\\&_login_and_user_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-w84c-2mv5-2rqj
|
The Dattch - The Lesbian App (aka com.dattch.dattch.app) application 0.30 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2015-8723
|
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2025-22814
|
WordPress Zephyr Admin Theme Plugin <= 1.4.1 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Admin Theme allows Cross Site Request Forgery.This issue affects Zephyr Admin Theme: from n/a through 1.4.1.
|
[] | null | 7.1 | null | null | null |
GHSA-v893-q2rg-wwfx
|
WatchGuard Fireware allows user enumeration, e.g., in the Firebox XML-RPC login handler. A login request that contains a blank password sent to the XML-RPC agent in Fireware v11.12.1 and earlier returns different responses for valid and invalid usernames. An attacker could exploit this vulnerability to enumerate valid usernames on an affected Firebox.
|
[] | null | null | 5.3 | null | null |
|
CVE-2019-13484
|
In Xymon through 4.3.28, a buffer overflow exists in the status-log viewer CGI because of expansion in appfeed.c.
|
[
"cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2024-25642
|
Improper Certificate Validation in SAP Cloud Connector
|
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system.
|
[
"cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
CVE-2019-0549
|
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0554, CVE-2019-0569.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
ICSA-21-040-01
|
GE Digital HMI/SCADA iFIX
|
The affected product allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation. CVE-2019-18243 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). The affected product allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation.CVE-2019-18255 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
|
[] | null | null | 6.1 | null | null |
GHSA-9jpx-r898-445c
|
While processing a message from firmware in htt_t2h_msg_handler_fast() in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, a buffer overwrite can occur.
|
[] | null | null | 7.8 | null | null |
|
CVE-2016-3376
|
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." a different vulnerability than CVE-2016-3266, CVE-2016-7185, and CVE-2016-7211.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2022-39246
|
matrix-android-sdk2 vulnerable to impersonation via forwarded Megolm sessions
|
matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the key forwarding strategy implemented in the matrix-android-sdk2 that is too permissive. Starting with version 1.5.1, the default policy for accepting key forwards has been made more strict in the matrix-android-sdk2. The matrix-android-sdk2 will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately (for example, by showing a warning for such messages). As a workaroubnd, current users of the SDK can disable key forwarding in their forks using `CryptoService#enableKeyGossiping(enable: Boolean)`.
|
[
"cpe:2.3:a:matrix:software_development_kit:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | null | null |
cisco-sa-pak-mem-exhst-3ke9FeFy
|
Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability
|
A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.
This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition.
Note: This vulnerability can be exploited using IPv4 or IPv6.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75416"].
|
[] | null | 8.6 | null | null | null |
GHSA-66rv-cp68-wh45
|
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-8335-9j62-qcq9
|
IBM Spectrum Scale 5.0.4.1 through 5.1.0.3 could allow a local privileged user to overwrite files due to improper input validation. IBM X-Force ID: 192541.
|
[] | null | 6 | null | null | null |
|
GHSA-hxrx-xf7q-22cr
|
IrfanView SID File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SID files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23277.
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-10926
|
IrfanView 4.44 (32bit) with FPX Plugin 4.47 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:fpx:4.47:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2024-44067
|
The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in the SOPHON SG2042 have instructions that allow unprivileged attackers to write to arbitrary physical memory locations, aka GhostWrite.
|
[
"cpe:2.3:o:alibaba:t-head_xuantie_c910:*:*:*:*:*:*:*:*",
"cpe:2.3:o:alibaba:t-head_xuantie_c920:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
CVE-2015-2201
|
Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows VisualRF remote OS command execution and file disclosure by administrative users.
|
[
"cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2018-11727
|
The libfsntfs_attribute_read_from_mft function in libfsntfs_attribute.c in libfsntfs through 2018-04-20 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted ntfs file. NOTE: the vendor has disputed this as described in libyal/libfsntfs issue 8 on GitHub
|
[
"cpe:2.3:a:libfsntfs_project:libfsntfs:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 1.9 | null |
|
CVE-2003-1189
|
Unknown vulnerability in Nokia IPSO 3.7, configured as IP Clusters, allows remote attackers to cause a denial of service via unknown attack vectors.
|
[
"cpe:2.3:o:nokia:ipso:3.7:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2010-5041
|
SQL injection vulnerability in index.php in the NP_Gallery plugin 0.94 for Nucleus allows remote attackers to execute arbitrary SQL commands via the id parameter in a plugin action.
|
[
"cpe:2.3:a:john_bradshaw:np_gallery_plugin:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleuscms:nucleus:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-p8h5-xqwr-ww86
|
It's possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions.
|
[] | null | null | null | null | null |
|
CVE-2017-14924
|
Cross-Site Request Forgery (CSRF) vulnerability via IMG element in Tiki before 16.3, 17.x before 17.1, 12 LTS before 12.12 LTS, and 15 LTS before 15.5 LTS allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with an IMG element, related to tiki-assignuser.php.
|
[
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.2:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.3:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.4:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.5:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.6:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.7:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.8:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.9:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.10:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:12.11:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:15.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:15.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:15.2:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:15.3:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:15.4:*:*:*:lts:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:17.0:*:*:*:*:*:*:*"
] | null | null | 8 | 6 | null |
|
GHSA-gw8w-qw5v-vj6c
|
Netdisco before v2.063000 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-6575
|
The Plus Addons for Elementor <= 5.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via TP Page Scroll Widget
|
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘res_width_value’ parameter within the plugin's tp_page_scroll widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*"
] | null | 6.4 | null | null | null |
GHSA-2cph-p23w-fhfq
|
Directory traversal vulnerability in includes/MapPinImageSave.php in the Easy2Map plugin before 1.2.5 for WordPress allows remote attackers to create arbitrary files via a .. (dot dot) in the map_id parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-3601
|
Cisco StarOS Privilege Escalation Vulnerability
|
A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device.
|
[
"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
RHSA-2013:0189
|
Red Hat Security Advisory: ipa-client security update
|
ipa: weakness when initiating join from IPA client can potentially compromise IPA domain
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-627p-px2w-v33p
|
The SendGrid for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wp_mailplus_clear_logs' function in all versions up to, and including, 1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's log files.
|
[] | null | 4.3 | null | null | null |
|
GHSA-8wcc-m6j2-qxvm
|
ASA-2024-0012, ASA-2024-0013: CosmosSDK: Transaction decoding may result in a stack overflow or resource exhaustion
|
SummaryASA-2024-0012Name: ASA-2024-0012, Transaction decoding may result in a stack overflow
Component: Cosmos SDK
Criticality: High (Considerable Impact, and Possible Likelihood per [ACMv1.2](https://github.com/interchainio/security/blob/main/resources/CLASSIFICATION_MATRIX.md))
Affected versions: cosmos-sdk versions <= v0.50.10, <= v0.47.14
Affected users: Chain Builders + Maintainers, Validators, node operatorsASA-2024-0013Name: ASA-2024-0013: CosmosSDK: Transaction decoding may result in resource exhaustion
Component: Cosmos SDK
Criticality: High (Considerable Impact, and Possible Likelihood per [ACMv1.2](https://github.com/interchainio/security/blob/main/resources/CLASSIFICATION_MATRIX.md))
Affected versions: cosmos-sdk versions <= v0.50.10, <= v0.47.14
Affected users: Chain Builders + Maintainers, Validators, node operatorsImpactASA-2024-0012When decoding a maliciously formed packet with a deeply-nested structure, it may be possible for a stack overflow to occur and result in a network halt. This was addressed by adding a recursion limit while decoding the packet.ASA-2024-0013Nested messages in a transaction can consume exponential cpu and memory on `UnpackAny` calls. The`max_tx_bytes` sets a limit for external TX but is not applied for internal messages emitted by wasm contracts or a malicious validator block. This may result in a node crashing due to resource exhaustion. This was addressed by adding additional validation to prevent this condition.PatchesThe issues above are resolved in Cosmos SDK versions v0.47.15 or v0.50.11.
Please upgrade ASAP.Timeline for ASA-2024-0012October 1, 2024, 12:29pm UTC: Issue reported to the Cosmos Bug Bounty programOctober 1, 2024, 2:47pm UTC: Issue triaged by Amulet on-call, and distributed to Core teamDecember 9, 2024, 11:13am UTC: Core team completes patch for issueDec 14, 2024,16:00 UTC: Pre-notification deliveredDec 16, 2024, 16:00 UTC: Patch made availableThis issue was reported to the Cosmos Bug Bounty Program on HackerOne on October 1, 2024.Timeline for ASA-2024-0013October 19, 2024, 8:12pm UTC: Issue reported to the Cosmos Bug Bounty programOctober 19, 2024, 8:28pm UTC: Issue triaged by Amulet on-call, and distributed to Core teamDecember 11, 2024, 3:31pm UTC: Core team completes patch for issueDec 14, 2024, 16:00 UTC: Pre-notification deliveredDec 16, 2024, 16:00 UTC: Patch made availableThis issue was reported by LonelySloth to the Cosmos Bug Bounty Program on HackerOne on October 19, 2024.If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.If you have questions about Interchain security efforts, please reach out to our official communication channel at [security@interchain.io](mailto:security@interchain.io). For more information about the Interchain Foundation’s engagement with Amulet, and to sign up for security notification emails, please see https://github.com/interchainio/security.
|
[] | 8.7 | null | null | null | null |
GHSA-f33p-9287-h552
|
mat2 before 0.13.0 allows directory traversal during the ZIP archive cleaning process.
|
mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows `../` directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2014-8628
|
Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue.
|
[
"cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:1.3.8:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2023-6859
|
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-45844
|
BIG-IP monitors vulnerability
|
BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip:17.1.0:*:*:*:*:*:*:*"
] | 8.6 | 7.2 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.