id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2024:11529
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.1 | null | null | null |
CVE-2015-1720
|
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:r2:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2023-1100
|
SourceCodester Online Catering Reservation System POST Parameter add_message.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222003.
|
[
"cpe:2.3:a:online_catering_reservation_system_project:online_catering_reservation_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-7m83-852c-hhv7
|
A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.
|
[] | null | 4.6 | null | null | null |
|
GHSA-664w-mjf4-8rpc
|
IBM Security Identity Governance and Intelligence 5.2.6 could disclose highly sensitive information to other authenticated users on the sytem due to incorrect authorization. IBM X-Force ID: 175485.
|
[] | null | null | null | null | null |
|
GHSA-hhvv-m62h-5c8j
|
A vulnerability, which was classified as problematic, has been found in vexim2. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 21c0a60d12e9d587f905cd084b2c70f9b1592065. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215903.
|
[] | null | 6.1 | null | null | null |
|
GHSA-p56h-v253-6p88
|
ML Report version Between 2.00.000.0000 and 2.18.628.5980 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution.
|
[] | null | null | 9.8 | null | null |
|
GHSA-x75c-f5w5-hw79
|
A vulnerability exists in Docker Desktop prior to version 4.39.0 that could lead to the unintentional disclosure of sensitive information via application logs. In affected versions, proxy configuration data—potentially including sensitive details—was written to log files in clear text whenever an HTTP GET request was made through a proxy. An attacker with read access to these logs could obtain the proxy information and leverage it for further attacks or unauthorized access. Starting with version 4.39.0, Docker Desktop no longer logs the proxy string, thereby mitigating this risk.
|
[] | 5.2 | null | null | null | null |
|
CVE-2008-6631
|
Multiple cross-site scripting (XSS) vulnerabilities in index.php in BlogPHP 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) user parameter in a sendmessage action and the (2) username parameter when registering a new user, different vectors than CVE-2008-0679.
|
[
"cpe:2.3:a:blogphp:blogphp:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-r86w-r23c-j68w
|
Multiple use-after-free vulnerabilities in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper handling of MIME types by plug-ins.
|
[] | null | null | null | null | null |
|
CVE-2021-45656
|
Certain NETGEAR devices are affected by server-side injection. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40.
|
[
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2011-4712
|
Directory traversal vulnerability in Oxide WebServer allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in an HTTP request.
|
[
"cpe:2.3:a:monoxide0184:oxide_webserver:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-22740
|
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause information to be exposed when an unauthorized file is uploaded.
|
[
"cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:homelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:homelynk:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-6rmj-6826-5j8h
|
The email-ingestion feature in Best Practical Request Tracker 4.1.13 through 4.4 allows denial of service by remote attackers via an algorithmic complexity attack on email address parsing.
|
[] | null | null | 7.5 | null | null |
|
GHSA-h8pg-5qr6-rgvg
|
In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible
|
[] | null | 4.8 | null | null | null |
|
CVE-2021-26990
|
Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability that could allow a remote attacker to overwrite arbitrary system files.
|
[
"cpe:2.3:a:netapp:cloud_manager:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 9.4 | null |
|
CVE-2018-11058
|
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition, version prior to 4.0.5.3 (in 4.0.x) contain a Buffer Over-Read vulnerability when parsing ASN.1 data. A remote attacker could use maliciously constructed ASN.1 data that would result in such issue.
|
[
"cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:*",
"cpe:2.3:a:dell:bsafe_crypto-c:*:*:*:*:micro:*:*:*",
"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:real_user_experience_insight:13.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:real_user_experience_insight:13.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:security_service:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
GHSA-vw8h-m6gw-gg25
|
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0634, CVE-2019-0645.
|
[] | null | null | 7.5 | null | null |
|
PYSEC-2021-418
| null |
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseBinCount` is vulnerable to a heap OOB access. This is because of missing validation between the elements of the `values` argument and the shape of the sparse output. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-9q83-cv5j-75hv
|
Multiple PHP remote file inclusion vulnerabilities in playSMS 0.9.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) apps_path[plug] parameter to plugin/gateway/gnokii/init.php, the (2) apps_path[themes] parameter to plugin/themes/default/init.php, and the (3) apps_path[libs] parameter to lib/function.php.
|
[] | null | null | null | null | null |
|
CVE-2019-2994
|
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:marketing:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | 5.8 | null |
|
RHSA-2024:8170
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 8.8 | null | null | null |
CVE-2021-43940
|
Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
|
[
"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 | null |
|
GHSA-wrp4-cqfp-7f86
|
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the apcliKey parameter in the function FUN_0041bac4.
|
[] | null | 9.8 | null | null | null |
|
CVE-2005-2158
|
A regression error in the embedded HSQLDB in JBoss jBPM 2.0 allows remote attackers to execute arbitrary comands, a re-introduction of a vulnerability that was originally identified by CVE-2003-0845.
|
[
"cpe:2.3:a:jboss:jbpm:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-c3q9-524g-cc66
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
GHSA-883m-49fj-jg3j
|
The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.
|
[] | null | null | 7.8 | null | null |
|
GHSA-mchr-xvw2-q64f
|
Missing Authorization vulnerability in RomanCode MapSVG allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects MapSVG: from n/a through 8.5.31.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-45347
|
Online Food Ordering System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
|
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[
"cpe:2.3:a:projectworlds:online_food_ordering_script:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-jfxq-xghv-g97c
|
The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 254016.
|
[] | null | 8.4 | null | null | null |
|
CVE-2005-0474
|
SQL injection vulnerability in the user_valid_crypt function in user.php in WebCalendar 0.9.45 allows remote attackers to execute arbitrary SQL commands via an encoded webcalendar_session cookie.
|
[
"cpe:2.3:a:webcalendar:webcalendar:0.9.45:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2025-0180
|
WP Foodbakery <= 4.7 - Unauthenticated Privilege Escalation in foodbakery_registration_validation
|
The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator.
|
[] | null | 9.8 | null | null | null |
CVE-2022-2699
|
SourceCodester Simple E-Learning System claire_blake sql injection
|
A vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820.
|
[
"cpe:2.3:a:simple_e-learning_system_project:simple_e-learning_system:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
ICSA-20-070-05
|
Johnson Controls Metasys
|
An XXE vulnerability exists that may allow an attacker to harvest ASCII files from the server.CVE-2020-9044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
CVE-2025-6905
|
code-projects Car Rental System signup.php sql injection
|
A vulnerability, which was classified as critical, has been found in code-projects Car Rental System 1.0. This issue affects some unknown processing of the file /signup.php. The manipulation of the argument fname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-3h4p-g442-4q4v
|
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 4.8 | null | null | null |
|
RHSA-2023:5187
|
Red Hat Security Advisory: firefox security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 0 | null | null | null |
GHSA-wvw3-cj3j-fc6w
|
A vulnerability was discovered in Samsung Mobile Processor Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, and Exynos 2400 that involves a time-of-check to time-of-use (TOCTOU) race condition, which can lead to a Denial of Service.
|
[] | null | 5.1 | null | null | null |
|
CVE-2008-6326
|
SQL injection vulnerability in login.php in Simple Customer as downloaded on 20081118 allows remote attackers to execute arbitrary SQL commands via the email parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:simplecustomer:simple_customer:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-32ch-w695-p5qw
|
Unrestricted upload of file with dangerous type in WallacePOS 1.4.3 allows a remote, authenticated attacker to execute arbitrary code by uploading a malicious PHP file.
|
[] | null | null | 7.2 | null | null |
|
GHSA-65x6-98fh-f57m
|
In rw_t2t_handle_tlv_detect_rsp of rw_t2t_ndef.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147309942
|
[] | null | null | null | null | null |
|
GHSA-mgxh-x4jj-4grv
|
TP-Link Archer C5v 1.7_181221 devices allows remote attackers to retrieve cleartext credentials via [USER_CFG#0,0,0,0,0,0#0,0,0,0,0,0]0,0 to the /cgi?1&5 URI.
|
[] | null | null | null | null | null |
|
CVE-2024-5086
|
Essential Addons for Elementor PRO – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.8.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Team Member Carousel Widget
|
The Essential Addons for Elementor PRO – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Team Member Carousel widget in all Pro versions up to, and including, 5.8.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-7h45-vv72-9v3p
|
RAD SecFlow-2 devices with Hardware 0202, Firmware 4.1.01.63, and U-Boot 2010.12 allow URIs beginning with /.. for Directory Traversal, as demonstrated by reading /etc/shadow.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-23609
|
Path traveresal in iTunesRPC-Remastered
|
iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize user input used to remove files leading to file deletion only limited by the process permissions. Users are advised to upgrade as soon as possible.
|
[
"cpe:2.3:a:itunesrpc-remastered_project:itunesrpc-remastered:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
CVE-2014-7328
|
The brain abundance info (aka com.wbrainabundance) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:brainabundance:brain_abundance_info:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2022-31134
|
Zulip Server public data export contains attachments that are non-public
|
Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.
|
[
"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
CVE-2025-1170
|
code-projects Real Estate Property Management System Category.php cross site scripting
|
A vulnerability classified as problematic has been found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /Admin/Category.php. The manipulation of the argument Desc leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
GHSA-94g2-3j97-w3gv
|
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0668, CVE-2020-0669, CVE-2020-0671, CVE-2020-0672.
|
[] | null | null | null | null | null |
|
GHSA-fg28-v9fx-wgww
|
A Stored XSS vulnerability has been found in the administration page of the WTI Like Post plugin through 1.4.5 for WordPress. Once the administrator has submitted the data, the script stored is executed for all the users visiting the website.
|
[] | null | null | null | null | null |
|
GHSA-xh38-hrrg-8cjv
|
A prototype pollution vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to override existing attributes with ones that have incompatible type, which may lead to a crash via a network.We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QuTS hero h5.1.3.2578 build 20231110 and later
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-9586
|
Adobe Character Animator versions 3.2 and earlier have a buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:character_animator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-qwcr-wrmg-gpqr
|
An issue was discovered in WeaselCMS v0.3.5. XSS exists via Site Language, Site Title, Site Description, and Site Keywords on the SETTINGS page.
|
[] | null | null | 5.4 | null | null |
|
RHSA-2024:7324
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.7
|
go-retryablehttp: url might write sensitive information to log file path-to-regexp: Backtracking regular expressions cause ReDoS dompurify: XSS vulnerability via prototype pollution
|
[
"cpe:/a:redhat:logging:5.9::el9"
] | null | 7 | null | null | null |
GHSA-m7rg-8wvq-846v
|
Prototype pollution in nestie
|
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
[] | null | 9.8 | null | null | null |
GHSA-vp3g-7p5g-pfq8
|
GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt.
|
[] | null | null | null | null | null |
|
CVE-2022-27494
|
CROSS-SITE SCRIPTING CWE-79
|
Aethon TUG Home Base Server versions prior to version 24 are affected by un unauthenticated attacker who can freely access hashed user credentials.
|
[
"cpe:2.3:a:aethon:tug_home_base_server:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2021-22294
|
A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources.
|
[
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 | null |
|
GHSA-43vh-m5cv-9pgr
|
An exploitable denial-of-service vulnerability exists in the IPv4 functionality of Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 16.000, Series B FRN 15.002, Series B FRN 15.000, Series B FRN 14.000, Series B FRN 13.000, Series B FRN 12.000, Series B FRN 11.000 and Series B FRN 10.000. A specially crafted packet can cause a major error, resulting in a denial of service. An attacker can send a malicious packet to trigger this vulnerability.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-40457
|
The BGP daemon in Extreme Networks ExtremeXOS (aka EXOS) 30.7.1.1 allows an attacker (who is not on a directly connected network) to cause a denial of service (BGP session reset) because of BGP attribute error mishandling (for attribute 21 and 25). NOTE: the vendor disputes this because it is "evaluating support for RFC 7606 as a future feature" and believes that "customers that have chosen to not require or implement RFC 7606 have done so willingly and with knowledge of what is needed to defend against these types of attacks."
|
[
"cpe:2.3:o:extremenetworks:extremeos:*:*:*:*:*:*:*:*"
] | null | null | null | null | null |
|
GHSA-fg83-957r-cgq5
|
PHP remote file inclusion vulnerability in lib.editor.inc.php in Intelimen InteliEditor 1.2.x allows remote attackers to execute arbitrary PHP code via a URL in the sys_path parameter.
|
[] | null | null | null | null | null |
|
GHSA-vh23-x25h-2wfm
|
The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
|
[] | null | 5.3 | null | null | null |
|
GHSA-2gg4-ghg8-24r5
|
IBM Maximo Asset Management is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | null | 5.4 | null | null |
|
GHSA-rx3v-xhcx-x379
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olympus Themes Olympus Shortcodes allows DOM-Based XSS.This issue affects Olympus Shortcodes: from n/a through 1.0.4.
|
[] | null | 6.5 | null | null | null |
|
GHSA-fjfw-648m-hm95
|
kkFileView v4.3.0 is vulnerable to Incorrect Access Control.
|
[] | null | 6.1 | null | null | null |
|
RHSA-2016:2808
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7
|
tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 7.5 | null | null |
CVE-2021-47339
|
media: v4l2-core: explicitly clear ioctl input data
|
In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-core: explicitly clear ioctl input data
As seen from a recent syzbot bug report, mistakes in the compat ioctl
implementation can lead to uninitialized kernel stack data getting used
as input for driver ioctl handlers.
The reported bug is now fixed, but it's possible that other related
bugs are still present or get added in the future. As the drivers need
to check user input already, the possible impact is fairly low, but it
might still cause an information leak.
To be on the safe side, always clear the entire ioctl buffer before
calling the conversion handler functions that are meant to initialize
them.
|
[] | null | 5.5 | null | null | null |
GHSA-3w7r-v4fr-r43w
|
Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.
|
[] | null | 4.4 | null | null | null |
|
GHSA-8c87-7q9f-g37m
|
explorer.php in PhotoAlbum 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
|
[] | null | null | null | null | null |
|
CVE-2022-0434
|
Page Views Count < 2.4.15 - Unauthenticated SQL Injection
|
The Page View Count WordPress plugin before 2.4.15 does not sanitise and escape the post_ids parameter before using it in a SQL statement via a REST endpoint, available to both unauthenticated and authenticated users. As a result, unauthenticated attackers could perform SQL injection attacks
|
[
"cpe:2.3:a:a3rev:page_view_count:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
CVE-2017-9517
|
atmail before 7.8.0.2 has CSRF, allowing an attacker to upload and import users via CSV.
|
[
"cpe:2.3:a:atmail:atmail:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-8rw9-r52p-wrmg
|
TOTOLINK EX1200T V4.1.2cu.5215 is affected by a command injection vulnerability that can remotely execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wwgf-3xp7-cxj4
|
Potentially sensitive data exposure in Symfony Web Socket Bundle
|
ImpactInside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive.PatchesIn 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails.WorkaroundsUpgrade to 1.10.4, 2.6.1, and 3.3.0Note, the 1.x branch is considered end of support as of July 1, 2020.For more informationIf you have any questions or comments about this advisory:Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle)
|
[] | null | 5.9 | null | null | null |
GHSA-2gf5-qcr8-g3jg
|
A user without administrator permissions with access to the UC500 windows system could perform a memory dump of the running processes and extract clear credentials or valid session tokens.
|
[] | null | 4.1 | null | null | null |
|
CVE-2015-6506
|
Cross-site scripting (XSS) vulnerability in the cryptography interface in Request Tracker (RT) before 4.2.12 allows remote attackers to inject arbitrary web script or HTML via a crafted public key.
|
[
"cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-3244
|
Import all XML, CSV & TXT into WordPress < 6.5.8 - Missing Authorisation
|
The Import all XML, CSV & TXT WordPress plugin before 6.5.8 does not have authorisation in some places, which could allow any authenticated users to access some of the plugin features if they manage to get the related nonce
|
[
"cpe:2.3:a:smackcoders:import_all_pages\\,_post_types\\,_products\\,_orders\\,_and_users_as_xml_\\&_csv:*:*:*:*:wordpress:*:*:*"
] | null | 4.2 | null | null | null |
GHSA-2h8f-c5j4-6pq8
|
The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.
|
[] | null | null | null | null | null |
|
GHSA-fgpw-cx3v-wj95
|
Ryu Infinite Loop vulnerability
|
`OFPPacketQueue` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `OFPQueueProp.len=0`.
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2024-24429
|
A reachable assertion in the nas_eps_send_emm_to_esm function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP packet.
|
[] | null | 8.6 | null | null | null |
|
GHSA-c2c7-r6r9-3c2v
|
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Cimatti Consulting WordPress Contact Forms by Cimatti plugin <= 1.5.4 versions.
|
[] | null | 6.1 | null | null | null |
|
RHSA-2002:170
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null | null |
GHSA-p2ww-36fq-xhvh
|
Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.
|
[] | null | null | null | null | null |
|
CVE-2022-36906
|
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
|
[
"cpe:2.3:a:jenkins:openshift_deployer:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-43pp-rgp9-c5h8
|
Radare2 has a use-after-free vulnerability in pyc parser's get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service.
|
[] | null | 10 | null | null | null |
|
GHSA-5q78-v5qx-c82x
|
There is a logic vulnerability in Elf-G10HN 1.0.0.608. An unauthenticated attacker could perform specific operations to exploit this vulnerability. Due to insufficient security design, successful exploit could allow an attacker to add users to be friends without prompting in the target device.
|
[] | null | 7.5 | null | null | null |
|
GHSA-rhqw-486f-x8rq
|
Improper Control of Generation of Code ('Code Injection') vulnerability in BinaryStash WP Booklet.This issue affects WP Booklet: from n/a through 2.1.8.
|
[] | null | 8.5 | null | null | null |
|
GHSA-jf3j-gf83-hhg3
|
Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.
|
[] | null | 8.4 | null | null | null |
|
GHSA-6gfj-hx6v-9w5q
|
The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to Unauthenticated Post Trashing due to a missing capability check on the delete_access_plan function and the related AJAX calls in all versions up to, and including, 8.0.1. This makes it possible for unauthenticated attackers to change status to "Trash" for every published post, therefore limiting the availability of the website's content.
|
[] | null | 5.3 | null | null | null |
|
CVE-2018-7453
|
Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml.
|
[
"cpe:2.3:a:xpdfreader:xpdf:4.00:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
RHSA-2011:1102
|
Red Hat Security Advisory: libsoup security update
|
libsoup: SoupServer directory traversal flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null | null |
GHSA-9h2p-wj4m-pwpg
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Grade Us, Inc. Review Stream plugin <= 1.6.5 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-29w2-8xf2-3r76
|
Cross-Site Request Forgery (CSRF) vulnerability in Store Locator Widgets Store Locator Widget allows Stored XSS. This issue affects Store Locator Widget: from n/a through 20200131.
|
[] | null | 7.1 | null | null | null |
|
CVE-2003-0998
|
Unknown "potential system security vulnerability" in Computer Associates (CA) Unicenter Remote Control 5.0 through 5.2, and ControlIT 5.0 and 5.1, may allow attackers to gain privileges to the local system account.
|
[
"cpe:2.3:a:broadcom:unicenter_remote_control:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_remote_control_option:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_remote_control_option:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:controlit:5.0:*:advanced:*:*:*:*:*",
"cpe:2.3:a:ca:controlit:5.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ca:controlit:5.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_remote_control_option:5.1:*:*:de:*:*:*:*"
] | null | null | null | 4.6 | null |
|
RHSA-2023:6893
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.44 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null | null |
CVE-2018-5663
|
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php button_text_link parameter.
|
[
"cpe:2.3:a:responsive_coming_soon_page_project:responsive_coming_soon_page:1.1.18:*:*:*:*:wordpress:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2021-25765
|
In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible.
|
[
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
ICSA-17-234-05
|
Saia Burgess Controls PCD Controllers
|
In certain circumstances, the device pads Ethernet frames with memory contents.CVE-2017-9628 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 5.3 | null | null |
CVE-2018-9109
|
Studio 42 elFinder before 2.1.36 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process.
|
[
"cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 7.5 | null |
|
CVE-2013-1560
|
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 2.8.0 through 4.1.0 allows remote authenticated users to affect confidentiality via vectors related to BASE, a different vulnerability than CVE-2013-2385.
|
[
"cpe:2.3:a:oracle:financial_services_software:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:4.1.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2002-2328
|
Active Directory in Windows 2000, when supporting Kerberos V authentication and GSSAPI, allows remote attackers to cause a denial of service (hang) via an LDAP client that sets the page length to zero during a large request.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.