id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-wr3c-mqrf-pcv6
|
In JetBrains IntelliJ IDEA 2020.3.3, local code execution was possible because of insufficient checks when getting the project from VCS.
|
[] | null | null | null | null | null |
|
GHSA-35pm-xrv5-x4qv
|
IBM API Connect 2018.1.0.0, 2018.2.1, 2018.2.2, 2018.2.3, and 2018.2.4 contains a vulnerability that could allow an authenticated user to obtain sensitive information. IBM X-Force ID: 142657.
|
[] | null | null | 4.3 | null | null |
|
GHSA-qr73-9894-ffxf
|
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
|
[] | null | null | 9.8 | null | null |
|
GHSA-59j2-44h9-8h98
|
Jizhicms v2.5 was discovered to contain an arbitrary file download vulnerability via the component /admin/c/PluginsController.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9crh-cc7m-2263
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (5) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (6) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header.
|
[] | null | null | null | null | null |
|
CVE-2025-30326
|
Photoshop Desktop | Access of Uninitialized Pointer (CWE-824)
|
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
GHSA-2rc5-2755-v422
|
Mautic vulnerable to stored cross-site scripting in description field
|
ImpactPrior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.This could lead to the user having elevated access to the system.PatchesUpdate to 4.4.12WorkaroundsNoneReferenceshttps://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_ScriptingIf you have any questions or comments about this advisory:Email us at [security@mautic.org](mailto:security@mautic.org)
|
[] | 8.6 | 7.6 | null | null | null |
CVE-2021-44548
|
Apache Solr information disclosure vulnerability through DataImportHandler
|
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.
|
[
"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 | null |
GHSA-rfrh-3q7r-m8g9
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 9.8 | null | null | null |
|
GHSA-9w58-4h36-h2g3
|
Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect integrity via vectors related to OAM Diagnostics.
|
[] | null | null | null | null | null |
|
CVE-2018-19790
|
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
|
[
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 | null |
|
RHSA-2024:5523
|
Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 security update
|
kernel: net: kernel: UAF in network route management
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null | null |
CVE-2014-2620
|
Unspecified vulnerability in HP Intelligent Management Center (iMC) before 7.0 E02020P03 and Branch Intelligent Management System (BIMS) before 7.0 E0201P02 allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-2089.
|
[
"cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-55fw-854f-62mp
|
The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
|
[] | null | 6.5 | null | null | null |
|
GHSA-ghfp-2gc6-6959
|
Untrusted search path vulnerability in moviEZ HD 1.0 Build 2554-29894-A allows local users to gain privileges via a Trojan horse avrt.dll file in the current working directory, as demonstrated by a directory that contains a .mvz file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2018-5164
|
Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox < 60.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2025-0473
|
Incomplete Cleanup vulnerability in PMB platform
|
Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the ‘/pmb/authorities/import/iimport_authorities’ endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to ‘/pmb/authorities/import/iimport_authorities’. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted.
|
[] | null | 6.5 | null | null | null |
CVE-2022-47880
|
An Information disclosure vulnerability in /be/rpc.php in Jedox GmbH Jedox 2020.2.5 allow remote, authenticated users with permissions to modify database connections to disclose a connections' cleartext password via the 'test connection' function.
|
[
"cpe:2.3:a:jedox:jedox:2020.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jedox:jedox_cloud:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
CVE-2017-18217
|
An issue was discovered in InvoicePlane before 1.5.5. It was observed that the Email address and Web address parameters are vulnerable to Cross Site Scripting, related to application/modules/clients/views/view.php, application/modules/invoices/views/view.php, and application/modules/quotes/views/view.php.
|
[
"cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2023-30928
|
In telephony service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2025-48999
|
Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability
|
DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
|
[] | 6.8 | null | null | null | null |
CVE-2025-23774
|
WordPress WPDB to Sql plugin <= 1.2 - Sensitive Data Exposure vulnerability
|
Insertion of Sensitive Information Into Sent Data vulnerability in NotFound WPDB to Sql allows Retrieve Embedded Sensitive Data. This issue affects WPDB to Sql: from n/a through 1.2.
|
[] | null | 7.5 | null | null | null |
CVE-2016-4962
|
The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
|
[
"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"
] | null | null | 6.7 | 6.8 | null |
|
GHSA-hxqx-mgwx-225x
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2005-4649
|
Multiple cross-site scripting (XSS) vulnerabilities in Advanced Guestbook 2.2 and 2.3.1 allow remote attackers to inject arbitrary web script or HTML via (1) the entry parameter in index.php and (2) the gb_id parameter in comment.php. NOTE: The index.php/entry vector might be resultant from CVE-2005-1548.
|
[
"cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-34gx-cxph-hgc9
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Security Bypass vulnerability. Successful exploitation could lead to privilege escalation.
|
[] | null | null | 9.8 | null | null |
|
GHSA-2946-xv2c-75wg
|
The UpdateDataSize function in ebmlmaster.c in libebml2 through 2012-08-26 allows remote attackers to cause a denial of service (assert fault) via a crafted mkv file.
|
[] | null | null | 6.5 | null | null |
|
GHSA-jgrw-jvh2-ph7j
|
The Eventer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-5497
|
Out of bounds memory access in Browser UI in Google Chrome prior to 125.0.6422.141 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2013-4152
|
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue.
|
[
"cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m1:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m2:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m3:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m4:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0.m1:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0.m2:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:4.0.0:milestone1:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-22421
|
Out-of-bounds read vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.9.0 and earlier. The insufficient buffer size for the PLC program instructions leads to out-of-bounds read. As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
|
[
"cpe:2.3:a:jtekt:kostac_plc_programming_software:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-rj38-87f3-93p6
|
Downloads Resources over HTTP in limbus-buildgen
|
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`.RecommendationUpdate to version 0.1.1 or later.
|
[] | null | null | null | null | null |
GHSA-89fq-mfqc-jvjp
|
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
|
[] | null | null | null | null | null |
|
RHSA-2016:2816
|
Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update
|
Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
|
[
"cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
] | null | null | 6.5 | null | null |
CVE-2009-0278
|
Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request.
|
[
"cpe:2.3:a:sun:java_system_application_server:8.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:x86:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-5fvg-h778-jjjx
|
Missing permission checks in Jenkins Katalon Plugin allow capturing credentials
|
Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Katalon Plugin 1.0.33 properly performs permission checks when accessing the affected HTTP endpoints.
|
[] | null | 4.2 | null | null | null |
CVE-2008-3521
|
Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit. NOTE: this was originally reported as a symlink issue, but this was incorrect. NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
|
[
"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-j79v-j722-m7gr
|
Afterlogic Aurora through 8.3.9-build-a3 has XSS that can be leveraged for session hijacking by retrieving the session cookie from the administrator login.
|
[] | null | 6.1 | null | null | null |
|
GHSA-wxg2-rrf5-g5rr
|
Directory traversal vulnerability in download.php in Rama Zaiten CMS 0.9.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
[] | null | null | null | null | null |
|
GHSA-954f-xw44-56r2
|
Authentication cache in Active Directory Jenkins Plugin allows logging in with any password
|
Jenkins Active Directory Plugin implements two separate modes: Integration with ADSI on Windows, and an OS agnostic LDAP-based mode. Optionally, to reduce lookup time, a cache can be configured to remember user lookups and user authentications.In Active Directory Plugin prior to 2.20 and 2.16.1, when run in Windows/ADSI mode, the provided password was not used when looking up an applicable cache entry. This allows attackers to log in as any user using any password while a successful authentication of that user is still in the cache.As a workaround for this issue, the cache can be disabled.Active Directory Plugin 2.20 and 2.16.1 includes the provided password in cache entry lookup.Additionally, the Java system property `hudson.plugins.active_directory.CacheUtil.noCacheAuth` can be set to `true` to no longer cache user authentications.
|
[] | null | 9.8 | null | null | null |
CVE-2010-4871
|
Unspecified vulnerability in SmartFTP before 4.0 Build 1142 allows attackers to have an unknown impact via a long filename.
|
[
"cpe:2.3:a:smartftp:smartftp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:smartftp:smartftp:2.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2009-2712
|
Sun Java System Access Manager 6.3 2005Q1, 7.0 2005Q4, and 7.1; and OpenSSO Enterprise 8.0; when AMConfig.properties enables the debug flag, allows local users to discover cleartext passwords by reading debug files.
|
[
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_10_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_8_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_9_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_10_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_8_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_9_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_10_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_8_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_9_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_10_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_8_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_9_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_10_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_8_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_9_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_10_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_8_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_9_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_10_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_8_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:6.3_2005q1:*:solaris_9_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_10_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_8_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_9_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_10_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_8_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_9_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_access_manager:7.1:*:war:*:*:*:*:*",
"cpe:2.3:a:sun:opensso_enterprise:8.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2021-31492
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12720.
|
[
"cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-4gqh-r946-jvgc
|
A vulnerability, which was classified as critical, has been found in zhijiantianya ruoyi-vue-pro 2.4.1. Affected by this issue is some unknown functionality of the file /app-api/infra/file/upload of the component Front-End Store Interface. The manipulation of the argument path leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 5.4 | null | null | null |
|
GHSA-w2w6-c746-7p2j
|
XSS exists in InfoVista VistaPortal SE Version 5.1 (build 51029). VPortal/mgtconsole/RolePermissions.jsp has reflected XSS via the ConnPoolName parameter.
|
[] | null | null | 6.1 | null | null |
|
CVE-2023-43658
|
Improper escaping of user input in discourse-calendar
|
dicourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Improper escaping of event titles could lead to Cross-site Scripting (XSS) within the 'email preview' UI when a site has CSP disabled. Having CSP disabled is a non-default configuration, so the vast majority of sites are unaffected. This problem is resolved in the latest version of the discourse-calendar plugin. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
|
[
"cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:discourse:*:*"
] | null | 8 | null | null | null |
GHSA-693v-vh3p-cg3g
|
Stack-based buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via vectors related to an axis properties record, and improper incrementing of an array index, aka "Excel Array Indexing Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-c5j5-q67x-gpcc
|
An Improper Check for Unusual or
Exceptional Conditions vulnerability in Brocade Fabric OS before 9.2.2.a
could allow an authenticated, network-based attacker to cause a
Denial-of-Service (DoS).
The
vulnerability is encountered when supportsave is invoked remotely,
using ssh command or SANnav inline ssh, and the corresponding ssh
session is terminated with Control C (^c ) before supportsave
completion.
This issue affects Brocade Fabric OS 9.0.0 through 9.2.2
|
[] | 6.8 | null | null | null | null |
|
CVE-2024-6974
|
Cato Networks Windows SDP Client Local Privilege Escalation via self-upgrade
|
Cato Networks Windows SDP Client Local Privilege Escalation via self-upgradeThis issue affects SDP Client: before 5.10.34.
|
[
"cpe:2.3:a:catonetworks:sdp_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*"
] | null | 8.8 | null | null | null |
GHSA-5v3p-96xh-6hxq
|
A vulnerability has been found in viames Pair Framework up to 1.9.11 and classified as critical. Affected by this vulnerability is the function getCookieContent of the file /src/UserRemember.php of the component PHP Object Handler. The manipulation of the argument cookieName leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2014-9373
|
Directory traversal vulnerability in the CollectorConfInfoServlet servlet in ManageEngine NetFlow Analyzer allows remote attackers to execute arbitrary code via a .. (dot dot) in the filename.
|
[
"cpe:2.3:a:manageengine:netflow_analyzer:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-4q47-ph87-fq4f
|
Passwords stored in plain text by Jenkins Artifactory Plugin
|
Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password in plain text in the global configuration file `org.jfrog.hudson.ArtifactoryBuilder.xml`. This password can be viewed by users with access to the Jenkins controller file system.Artifactory Plugin 3.6.0 now stores the Artifactory server password encrypted. This change is effective once the global configuration is saved the next time.
|
[] | null | 3.3 | null | null | null |
GHSA-vqv5-385r-2hf8
|
Contrast's unauthenticated recovery allows Coordinator impersonation
|
ImpactRecovering coordinators do not verify the seed provided by the recovering party. This allows an attacker to set up a coordinator with a manifest that passes validation, but with a secret seed controlled by the attacker.If network traffic is redirected from the legitimate coordinator to the attacker's coordinator, a workload owner is susceptible to impersonation if eitherthey `set` a new manifest and don't compare the root CA cert with the existing one (this is the default of the `contrast` CLI) orthey `verify` the coordinator and don't compare the root CA cert with a trusted reference.Under these circumstances, the attacker can:Issue certificates that chain back to the attacker coordinator's root CA.Recover arbitrary workload secrets of workloads deployed after the attack.This issue does **not** affect the following:secrets of the legitimate coordinator (seed, workload secrets, CA)integrity of workloads, even when used with the rogue coordinatorcertificates chaining back to the mesh CAPatchesThis issue is patched in Contrast v1.4.1.WorkaroundsThe issue can be avoided by verifying the coordinator root CA cert against expectations.At the first `set` call, keep a copy of the CA cert returned by the coordinator.After subsequent `set` or `verify` calls, compare the returned CA cert with the backup copy. If it matches bit-for-bit, the coordinator is legitimate.
|
[] | null | 7.1 | null | null | null |
GHSA-3wwx-33h5-h9f5
|
CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors related to ssl_halen when running ccn-lite-sim, which trigger an out-of-bounds access.
|
[] | null | null | 9.8 | null | null |
|
GHSA-2wv5-fxxc-g48c
|
The Bug Genie before 3.2.6 has Multiple XSS and HTML Injection Vulnerabilities
|
[] | null | null | null | null | null |
|
CVE-2012-5138
|
Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact and attack vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.93:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-37mg-956f-9m7p
|
An issue in the dfe_unit_gb_dependant component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[] | null | 7.5 | null | null | null |
|
GHSA-p274-6jm7-638m
|
An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-31668540. References: N-CVE-2016-8460.
|
[] | null | null | 5.5 | null | null |
|
GHSA-v34h-4v23-vppf
|
Directory traversal vulnerability in a third-party compression library (UNACEV2.DLL), as used in avast! Antivirus Home/Professional Edition 4.6.665 and Server Edition 4.6.460, allows remote attackers to write arbitrary files via an ACE archive containing filenames with (1) .. or (2) absolute pathnames.
|
[] | null | null | null | null | null |
|
GHSA-4r4g-jmhw-hh6h
|
Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.
|
[] | null | null | null | null | null |
|
CVE-2023-49093
|
HtmlUnit vulnerable to Remote Code Execution (RCE) via XSTL
|
HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0
|
[
"cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2015-5950
|
The NVIDIA display driver R352 before 353.82 and R340 before 341.81 on Windows; R304 before 304.128, R340 before 340.93, and R352 before 352.41 on Linux; and R352 before 352.46 on GRID vGPU and vSGA allows local users to write to an arbitrary kernel memory location and consequently gain privileges via a crafted ioctl call.
|
[
"cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:304.108:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:304.119:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:304.121:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:304.123:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:304.125:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:352.21:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:352.30:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:display_driver:340.43:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:display_driver:340.52:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:display_driver:341.44:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:display_driver:353.06:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2023-6865
|
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-cjp2-4rww-387p
|
crontab.c in crontab in FreeBSD and Apple Mac OS X allows local users to (1) determine the existence of arbitrary files via a symlink attack on a /tmp/crontab.XXXXXXXXXX temporary file and (2) perform MD5 checksum comparisons on arbitrary pairs of files via two symlink attacks on /tmp/crontab.XXXXXXXXXX temporary files.
|
[] | null | null | null | null | null |
|
CVE-2008-2830
|
Open Scripting Architecture in Apple Mac OS X 10.4.11 and 10.5.4, and some other 10.4 and 10.5 versions, does not properly restrict the loading of scripting addition plugins, which allows local users to gain privileges via scripting addition commands to a privileged application, as originally demonstrated by an osascript tell command to ARDAgent.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
cisco-sa-ftd-statcred-dFC8tXT5
|
Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability
|
A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials.
This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
|
[] | null | 9.3 | null | null | null |
CVE-2022-49899
|
fscrypt: stop using keyrings subsystem for fscrypt_master_key
|
In the Linux kernel, the following vulnerability has been resolved:
fscrypt: stop using keyrings subsystem for fscrypt_master_key
The approach of fs/crypto/ internally managing the fscrypt_master_key
structs as the payloads of "struct key" objects contained in a
"struct key" keyring has outlived its usefulness. The original idea was
to simplify the code by reusing code from the keyrings subsystem.
However, several issues have arisen that can't easily be resolved:
- When a master key struct is destroyed, blk_crypto_evict_key() must be
called on any per-mode keys embedded in it. (This started being the
case when inline encryption support was added.) Yet, the keyrings
subsystem can arbitrarily delay the destruction of keys, even past the
time the filesystem was unmounted. Therefore, currently there is no
easy way to call blk_crypto_evict_key() when a master key is
destroyed. Currently, this is worked around by holding an extra
reference to the filesystem's request_queue(s). But it was overlooked
that the request_queue reference is *not* guaranteed to pin the
corresponding blk_crypto_profile too; for device-mapper devices that
support inline crypto, it doesn't. This can cause a use-after-free.
- When the last inode that was using an incompletely-removed master key
is evicted, the master key removal is completed by removing the key
struct from the keyring. Currently this is done via key_invalidate().
Yet, key_invalidate() takes the key semaphore. This can deadlock when
called from the shrinker, since in fscrypt_ioctl_add_key(), memory is
allocated with GFP_KERNEL under the same semaphore.
- More generally, the fact that the keyrings subsystem can arbitrarily
delay the destruction of keys (via garbage collection delay, or via
random processes getting temporary key references) is undesirable, as
it means we can't strictly guarantee that all secrets are ever wiped.
- Doing the master key lookups via the keyrings subsystem results in the
key_permission LSM hook being called. fscrypt doesn't want this, as
all access control for encrypted files is designed to happen via the
files themselves, like any other files. The workaround which SELinux
users are using is to change their SELinux policy to grant key search
access to all domains. This works, but it is an odd extra step that
shouldn't really have to be done.
The fix for all these issues is to change the implementation to what I
should have done originally: don't use the keyrings subsystem to keep
track of the filesystem's fscrypt_master_key structs. Instead, just
store them in a regular kernel data structure, and rework the reference
counting, locking, and lifetime accordingly. Retain support for
RCU-mode key lookups by using a hash table. Replace fscrypt_sb_free()
with fscrypt_sb_delete(), which releases the keys synchronously and runs
a bit earlier during unmount, so that block devices are still available.
A side effect of this patch is that neither the master keys themselves
nor the filesystem keyrings will be listed in /proc/keys anymore.
("Master key users" and the master key users keyrings will still be
listed.) However, this was mostly an implementation detail, and it was
intended just for debugging purposes. I don't know of anyone using it.
This patch does *not* change how "master key users" (->mk_users) works;
that still uses the keyrings subsystem. That is still needed for key
quotas, and changing that isn't necessary to solve the issues listed
above. If we decide to change that too, it would be a separate patch.
I've marked this as fixing the original commit that added the fscrypt
keyring, but as noted above the most important issue that this patch
fixes wasn't introduced until the addition of inline encryption support.
|
[] | null | 5.5 | null | null | null |
GHSA-x93v-xcwm-c8r4
|
The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
|
[] | null | null | 9.8 | null | null |
|
CVE-2006-6747
|
SQL injection vulnerability in show_news.php in Xt-News 0.1 allows remote attackers to execute arbitrary SQL commands via the id_news parameter.
|
[
"cpe:2.3:a:dreaxteam:xt-news:0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-1182
|
An issue was discovered in EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); RSA Via Lifecycle and Governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); RSA Identity Management & Governance (RSA IMG) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only). It allows certain OS level users to execute arbitrary scripts with root level privileges.
|
[
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2007-3028
|
The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4 does not properly check "the number of convertible attributes", which allows remote attackers to cause a denial of service (service unavailability) via a crafted LDAP request, related to "client sent LDAP request logic," aka "Windows Active Directory Denial of Service Vulnerability". NOTE: this is probably a different issue than CVE-2007-0040.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-v7gf-88v3-6c2x
|
A vulnerability was found in Monitorr 1.7.6m. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assets/php/upload.php of the component Services Configuration. The manipulation of the argument fileToUpload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251539. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 4.7 | null | null | null |
|
CVE-2025-4443
|
D-Link DIR-605L sub_454F2C command injection
|
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2016-1000129
|
Reflected XSS in wordpress plugin defa-online-image-protector v3.3
|
[
"cpe:2.3:a:defa-online-image-protector_project:defa-online-image-protector:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-5278-2h8h-4p7c
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Essential Real Estate allows PHP Local File Inclusion. This issue affects Essential Real Estate: from n/a through 5.2.0.
|
[] | null | 8.1 | null | null | null |
|
CVE-2022-20696
|
Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability
|
A vulnerability in the binding configuration of Cisco SD-WAN vManage Software containers could allow an unauthenticated, adjacent attacker who has access to the VPN0 logical network to also access the messaging service ports on an affected system. This vulnerability exists because the messaging server container ports on an affected system lack sufficient protection mechanisms. An attacker could exploit this vulnerability by connecting to the messaging service ports of the affected system. To exploit this vulnerability, the attacker must be able to send network traffic to interfaces within the VPN0 logical network. This network may be restricted to protect logical or physical adjacent networks, depending on device deployment configuration. A successful exploit could allow the attacker to view and inject messages into the messaging service, which can cause configuration changes or cause the system to reload.
|
[
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-8c82-9rgp-4qvr
|
Improper Neutralization of Input During Web Page Generation Apache Sling Servlets Post
|
The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings.
|
[] | null | null | 6.1 | null | null |
GHSA-8785-wc3w-h8q6
|
OpenTelemetry .NET has Denial of Service (DoS) Vulnerability in API Package
|
Impact_What kind of vulnerability is it? Who is impacted?_A vulnerability in `OpenTelemetry.Api` package `1.10.0` to `1.11.1` could cause a Denial of Service (DoS) when a `tracestate` and `traceparent` header is received.Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage.This issue impacts any application accessible over the web or backend services that process HTTP requests containing a `tracestate` header.Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime.Patches_Has the problem been patched? What versions should users upgrade to?_This issue has been <strong data-start="1143" data-end="1184">resolved in OpenTelemetry.Api 1.11.2</strong> by <strong data-start="1188" data-end="1212">reverting the change</strong> that introduced the problematic behavior in versions <strong data-start="1266" data-end="1286">1.10.0 to 1.11.1</strong>.</li><li data-start="1290" data-end="1409">The fix ensures that <strong data-start="1313" data-end="1380">valid tracing headers no longer cause excessive CPU consumption</strong> when received in requests.</li></ul><h4 data-start="1411" data-end="1434"><strong data-start="1416" data-end="1434">Fixed Version:</strong></h4>
OpenTelemetry .NET Version | Status
-- | --
<= 1.9.x | ✅ Not affected
1.10.0 - 1.11.1 | ❌ Vulnerable
1.11.2 (Fixed) | ✅ Safe to use**Upgrade Command:****Delisting of Affected Packages**
To prevent accidental usage, we have delisted the affected versions (1.10.0 to 1.11.1) from NuGet. Users should avoid these versions and upgrade to 1.11.2 immediately.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_References_Are there any links users can visit to find out more?_
|
[] | null | 6.5 | null | null | null |
GHSA-pggm-5qmx-5jg9
|
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
|
[] | null | 7.8 | null | null | null |
|
GHSA-wjcp-46f7-9fq7
|
Authorization Bypass Through User-Controlled Key vulnerability in Ricard Torres Thumbs Rating.This issue affects Thumbs Rating: from n/a through 5.1.0.
|
[] | null | 9.1 | null | null | null |
|
GHSA-cpc3-gm2x-mrvp
|
Jenkins Tag Profiler Plugin missing permission check
|
Jenkins Tag Profiler Plugin 0.2 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission to reset profiler statistics.Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.As of publication of this advisory, there is no fix.
|
[] | null | 4.3 | null | null | null |
GHSA-528q-4pgm-wvg2
|
Reflected XSS in go-httpbin due to unrestricted client control over Content-Type
|
DescriptionThe go-httpbin framework is vulnerable to XSS as the user can control the `Response Content-Type` from GET parameter. This allows attacker to execute cross site scripts in victims browser.Affected URLs:`/response-headers?Content-Type=text/html&xss=%3Cimg/src/onerror=alert(%27xss%27)%3E``/base64/PGltZy9zcmMvb25lcnJvcj1hbGVydCgneHNzJyk+?content-type=text/html``/base64/decode/PGltZy9zcmMvb25lcnJvcj1hbGVydCgneHNzJyk+?content-type=text/html`Steps to reproduce:Visit one of the above mentioned URLs.XSS window will popupSuggested fixAllow Only Safe Content-Type Values Or give users option to define whitelisted Content-Type headersCriticalityThe following can be major impacts of the issue:Access to victim's sensitive Personal Identifiable Information.Access to CSRF tokenCookie injectionPhishingAnd any other thing Javascript can perform
|
[] | 1.3 | null | null | null | null |
GHSA-jf9v-fxfq-wm76
|
Lift Sensitive Information Disclosure
|
The JsonParser class in json/JsonParser.scala in Lift before 2.5 interprets a certain end-index value as a length value, which allows remote authenticated users to obtain sensitive information from other users' sessions via invalid input data containing a < (less than) character.
|
[] | null | null | null | null | null |
GHSA-8m53-wx9g-89jg
|
Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 allows unauthenticated attackers to view internal paths and scripts via web files.
|
[] | null | 7.5 | null | null | null |
|
GHSA-cfvp-7f5p-8jr8
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | null | null | null |
|
GHSA-9x5c-5jg6-mcv6
|
Deserialization of Untrusted Data vulnerability in plainware.com PlainInventory allows Object Injection.This issue affects PlainInventory: from n/a through 3.1.6.
|
[] | null | 8.1 | null | null | null |
|
CVE-2009-2291
|
Unspecified vulnerability in LoginToboggan 6.x-1.x before 6.x-1.5, a module for Drupal, when "Allow users to login using their e-mail address" is enabled, allows remote blocked users to bypass intended access restrictions via unspecified vectors.
|
[
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-1.x:*:dev:*:*:*:*:*",
"cpe:2.3:a:chad_phillips:logintoboggan:6.x-2.x:*:dev:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2025-25477
|
A host header injection vulnerability in SysPass 3.2x allows an attacker to load malicious JS files from an arbitrary domain which would be executed in the victim's browser.
|
[] | null | 8.1 | null | null | null |
|
CVE-2010-5293
|
wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2017-8269
|
Userspace-controlled non null terminated parameter for IPA WAN ioctl in all Qualcomm products with Android releases from CAF using the Linux kernel can lead to exposure of kernel memory.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2007-4088
|
Multiple cross-site scripting (XSS) vulnerabilities in Vikingboard 0.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) id, (2) f, (3) quote, and (4) act parameters to cp.php; the (5) u parameter to user.php; the (6) f parameter to post.php; the (7) s parameter to topic.php; the (8) quote, (9) t, (10) poll, and (11) p parameters to post.php; the (12) Message Title field of a private message (PM) in mode 6 of cp.php; the (13) title field of a private message (PM) in mode 7 of cp.php; and (14) allow user-assisted remote attackers to inject arbitrary web script or HTML via a dosearch action to search.php, which reflects the first lines of all posts by a user. NOTE: the act parameter to help.php and the p parameter to report.php are already covered by CVE-2006-4708. NOTE: vectors 12 and 13 might overlap CVE-2006-6283.1. NOTE: vector 14 might overlap CVE-2006-4708.b.
|
[
"cpe:2.3:a:vikingboard:vikingboard:0.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2005-1031
|
RUNCMS 1.1A, and possibly other products based on e-Xoops (exoops), when "Allow custom avatar upload" is enabled, does not properly verify uploaded files, which allows remote attackers to upload arbitrary files.
|
[
"cpe:2.3:a:e-xoops:e-xoops:1.05r3:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-chjp-85fh-5fg7
|
Dell EMC PowerStore versions prior to 1.0.3.0.5.006 contain an OS Command Injection vulnerability in PowerStore X environment . A locally authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS command on the PowerStore underlying OS. Exploiting may lead to a system take over by an attacker.
|
[] | null | null | null | null | null |
|
GHSA-5x9h-vvfq-mc7m
|
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's
'wcj_product_barcode' shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes like 'color'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-p36j-vmfc-m4v5
|
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
|
[] | null | 6.5 | null | null | null |
|
GHSA-mqrg-8c46-vfrq
|
Huawei AR1220 routers with software before V200R005SPH006 allow remote attackers to cause a denial of service (board reset) via vectors involving a large amount of traffic from the GE port to the FE port.
|
[] | null | null | 5.9 | null | null |
|
RHSA-2024:1812
|
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-376 Bug Fixes
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
] | null | 4.3 | null | null | null |
CVE-2019-2073
|
In libxaac there is a possible out of bounds write to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117100484
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-xr29-6gg3-jq8m
|
SQL injection vulnerability in Page.asp in Baseline CMS 1.95 and earlier allows remote attackers to execute arbitrary SQL commands via the SiteNodeID parameter.
|
[] | null | null | null | null | null |
|
CVE-2003-1594
|
NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session.
|
[
"cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.