id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-hcj2-p7x3-3jmm
An arbitrary file upload vulnerability in the component /admin/cmsWebFile/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file.
[]
null
8.8
null
null
null
CVE-2015-8624
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.26.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-8m72-2vqc-w46g
The default configuration of IBM 4690 OS, as used in Toshiba Global Commerce Solutions 4690 POS and other products, hashes passwords with the ADXCRYPT algorithm, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified cryptanalysis of an ADXCSOUF.DAT file.
[]
null
null
null
null
null
GHSA-w2vv-gmgp-33q7
Unspecified vulnerability in the bazaar repository adapter in Redmine 0.9.x and 1.0.x before 1.0.5 allows remote attackers to execute arbitrary commands via unknown vectors.
[]
null
null
null
null
null
GHSA-vcpr-hm2m-gjjj
Reflected cross site scripting
Concrete CMS (previously concrete5) before 9.2 is vulnerable to Reflected XSS on the Reply form because msgID was not sanitized.
[]
null
6.1
null
null
null
GHSA-hjh7-cxcm-cxcw
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
[]
null
null
5.9
null
null
GHSA-5gp7-pf54-xc33
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
[]
null
7.5
null
null
null
GHSA-54gq-92ww-6vfg
Aztek Forum 4.00 allows remote attackers to obtain sensitive information via a direct request to forum.php with the fid=XD query string, which reveals the path in an error message.
[]
null
null
null
null
null
GHSA-wm2h-jpqw-93h6
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated by a request for (1) RemMagSNMP.html, which discloses SNMP communities; or (2) WLAN.html, which discloses WEP keys.
[]
null
null
null
null
null
CVE-2017-8992
HPE has identified a remote privilege escalation vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version.
[ "cpe:2.3:a:hp:centralview_fraud_risk_management:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2022-23983
WordPress WP Content Copy Protection & No Right Click plugin <= 3.4.4 - Cross-Site Request Forgery (CSRF) leads to Settings Update vulnerability
Cross-Site Request Forgery (CSRF) vulnerability leading to plugin Settings Update discovered in WP Content Copy Protection & No Right Click WordPress plugin (versions <= 3.4.4).
[ "cpe:2.3:a:wp-buy:wp_content_copy_protection_\\&_no_right_click:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2024-24698
Zoom Clients - Improper Authentication
Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.
[ "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*" ]
null
4.9
null
null
null
GHSA-wf83-p2hm-5f3v
In multiple functions of AccountManagerService.java, there is a possible way to bypass permissions and launch protected activities due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
[]
null
7
null
null
null
CVE-2004-2521
Mail server in Gattaca Server 2003 1.1.10.0 allows remote attackers to perform a denial of service (application crash) via a large number of connections to TCP port (1) 25 (SMTP) or (2) 110 (POP).
[ "cpe:2.3:o:geeos_team:gattaca_server_2003:1.1.10.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-3382
Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path.
[ "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2008-2144
Multiple unspecified vulnerabilities in Solaris print service for Sun Solaris 8, 9, and 10 allow remote attackers to cause a denial of service or execute arbitrary code via unknown vectors.
[ "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2008-2772
The Magic Tabs module 5.x before 5.x-1.1 for Drupal allows remote attackers to execute arbitrary PHP code via unspecified URL arguments, possibly related to a missing "whitelist of callbacks."
[ "cpe:2.3:a:drupal:magic_tabs_module:5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2024:4865
Red Hat Security Advisory: Red Hat Service Interconnect security update
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service skupper: potential authentication bypass to skupper console via forged cookies
[ "cpe:/a:redhat:service_interconnect:1.4::el9" ]
null
5.3
null
null
null
CVE-2020-4311
IBM Tivoli Monitoring 6.3.0 could allow a local attacker to execute arbitrary code on the system. By placing a specially crafted file, an attacker could exploit this vulnerability to load other DLL files located in the same directory and execute arbitrary code on the system. IBM X-Force ID: 177083.
[ "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0:*:*:*:*:*:*:*" ]
null
null
7.4
null
null
CVE-2024-2951
WordPress RegistrationMagic plugin <= 5.3.0.0 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.3.0.0.
[]
null
4.3
null
null
null
CVE-2025-32581
WordPress WordPress Spam Blocker Plugin <= 2.0.4 - CSRF to Stored XSS vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ankit Singla WordPress Spam Blocker allows Stored XSS. This issue affects WordPress Spam Blocker: from n/a through 2.0.4.
[]
null
7.1
null
null
null
CVE-2024-31161
ASUS Download Master - Arbitrary File Upload
The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage.
[ "cpe:2.3:a:asus:download_master:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2019-10460
Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
[ "cpe:2.3:a:jenkins:bitbucket_oauth:*:*:*:*:*:jenkins:*:*" ]
null
7.8
null
2.1
null
CVE-2002-0211
Race condition in the installation script for Tarantella Enterprise 3 3.01 through 3.20 creates a world-writeable temporary "gunzip" program before executing it, which could allow local users to execute arbitrary commands by modifying the program before it is executed.
[ "cpe:2.3:a:tarantella:tarantella_enterprise:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tarantella:tarantella_enterprise:3.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tarantella:tarantella_enterprise:3.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:tarantella:tarantella_enterprise:3.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:tarantella:tarantella_enterprise:3.3.20:*:*:*:*:*:*:*" ]
null
null
null
6.2
null
GHSA-7jqc-2xm3-38rq
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
5.5
null
null
null
CVE-2024-20438
Cisco Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerability
A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device. This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files. Note: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
[ "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2024-4988
Improper permission control in com.transsion.videocallenhancer
The mobile application (com.transsion.videocallenhancer) interface has improper permission control, which can lead to the risk of private file leakage.
[ "cpe:2.3:a:tecno:com.transsion.videocallenhancer:1.1.9.973:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-468c-w344-jh68
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
null
null
null
CVE-2025-28891
WordPress price-calc plugin <= 0.6.3 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in jazzigor price-calc allows Stored XSS. This issue affects price-calc: from n/a through 0.6.3.
[]
null
7.1
null
null
null
GHSA-xp83-qp92-cvpc
Unspecified vulnerability in the PeopleSoft Enterprise Portal component in Oracle PeopleSoft Products 9.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Saved Search.
[]
null
null
null
null
null
CVE-2016-0875
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL.
[ "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-cjj6-wmgg-xg75
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
[]
null
7.8
null
null
null
GHSA-gf63-cjpr-3c75
From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
[]
null
null
null
null
null
CVE-2003-0333
Multiple buffer overflows in kermit in HP-UX 10.20 and 11.00 (C-Kermit 6.0.192 and possibly other versions before 8.0) allow local users to gain privileges via long arguments to (1) ask, (2) askq, (3) define, (4) assign, and (5) getc, some of which may share the same underlying function "doask," a different vulnerability than CVE-2001-0085.
[ "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2024-23607
F5OS QKView utility vulnerability
A directory traversal vulnerability exists in the F5OS QKView utility that allows an authenticated attacker to read files outside the QKView directory.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
null
5.5
null
null
null
CVE-2014-9979
In all Qualcomm products with Android releases from CAF using the Linux kernel, a variable is uninitialized in a TrustZone system call potentially leading to the compromise of secure memory.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2018-7362
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper access control vulnerability, which may allows an unauthorized user to perform unauthorized operations on the router.
[ "cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
CVE-2019-15482
selectize-plugin-a11y before 1.1.0 has XSS via the msg field.
[ "cpe:2.3:a:selectize-plugin-a11y_project:selectize-plugin-a11y:*:*:*:*:*:node.js:*:*" ]
null
null
6.1
4.3
null
CVE-2018-10870
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
[ "cpe:2.3:a:redhat:certification:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-3hc6-296x-32rp
Microsoft Internet Explorer 6 through 9 does not block cross-domain scrolling events, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Scrolling Events Information Disclosure Vulnerability."
[]
null
null
null
null
null
CVE-2023-44847
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ Weixin.php component.
[ "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2023-38173
Microsoft Edge for Android Spoofing Vulnerability
Microsoft Edge for Android Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2020-12068
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.
[ "cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
null
CVE-2011-3103
Google V8, as used in Google Chrome before 19.0.1084.52, does not properly perform garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-pxq8-92ff-q845
A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.
[]
null
null
null
null
null
GHSA-92px-q4w8-hrr5
Malicious Package in impala
Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
[]
null
9.8
null
null
null
CVE-2024-49414
Authentication Bypass Using an Alternate Path in Dex Mode prior to SMR Dec-2024 Release 1 allows physical attackers to temporarily access to recent app list.
[ "cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2024-r1:*:*:*:*:*:*" ]
null
2.4
null
null
null
CVE-2013-1281
The NFS server in Microsoft Windows Server 2008 R2 and R2 SP1 and Server 2012 allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via an attempted renaming of a file or folder located on a read-only share, aka "NULL Dereference Vulnerability."
[ "cpe:2.3:o:microsoft:windows_server_2008:r2:-:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
GHSA-25r4-xgpc-p9hq
SQL injection vulnerability in the CMDB web application in synetics i-doit pro before 1.2.5 and i-doit open allows remote attackers to execute arbitrary SQL commands via the objID parameter to the default URI.
[]
null
null
null
null
null
CVE-2024-35539
Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
[ "cpe:2.3:a:typecho:cms:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2022-30629
Session tickets lack random ticket_age_add in crypto/tls
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2021-37748
Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.
[ "cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
null
CVE-2005-3369
Multiple SQL injection vulnerabilities in the Info-DB module (info_db.php) in Woltlab Burning Board 2.7 and earlier allow remote attackers to execute arbitrary SQL commands and possibly upload files via the (1) fileid and (2) subkatid parameters.
[ "cpe:2.3:a:woltlab:burning_board:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:woltlab:burning_board:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:woltlab:burning_board:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:woltlab:burning_board:2.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-mmq2-mq7r-x3wg
In mPreference of DefaultUsbConfigurationPreferenceController.java, there is a possible way to enable file transfer mode due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-205996517
[]
null
7.8
null
null
null
GHSA-w8rr-m9g7-26pr
A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the gf_isom_box_size function, which could cause a Denial of Service (context-dependent).
[]
null
5.5
null
null
null
CVE-2009-4082
PHP remote file inclusion vulnerability in forums/Forum_Include/index.php in Outreach Project Tool (OPT) 1.2.7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the CRM_path parameter.
[ "cpe:2.3:a:lanifex:outreach_project_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.94:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.933:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.934:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.935:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.936:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.937:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.938:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.939:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.941:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.942:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.943:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.944:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.945:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.946:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.947:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:0.948:beta:*:*:*:*:*:*", "cpe:2.3:a:lanifex:outreach_project_tool:1.2.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-45618
There are arbitrary file deletion vulnerabilities in the AirWave client service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
[ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2017-5038
Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
6.3
null
6.8
null
GHSA-j6hj-rv6w-c72f
The Himer WordPress theme before 2.1.1 does not have CSRF checks in some places, which could allow attackers to make users join private groups via a CSRF attack
[]
null
4.3
null
null
null
GHSA-x8m3-7hm7-vhmr
Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote attackers to obtain login access via a request to hosting/addreseller.asp with a username in the reseller parameter, followed by a request to AdminSettings/displays.asp with the DecideAction and ChangeSkin parameters.
[]
null
null
null
null
null
GHSA-gw88-4vw3-v8vg
GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.
[]
null
7.8
null
null
null
GHSA-2284-2gj7-8cqv
The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."
[]
null
null
null
null
null
GHSA-pgm2-2p72-h4hg
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: fix null-pointer dereference on edid readingUse i2c adapter when there isn't aux_mode in dc_link to fix a null-pointer derefence that happens when running igt@kms_force_connector_basic in a system with DCN2.1 and HDMI connector detected as below:[ +0.178146] BUG: kernel NULL pointer dereference, address: 00000000000004c0 [ +0.000010] #PF: supervisor read access in kernel mode [ +0.000005] #PF: error_code(0x0000) - not-present page [ +0.000004] PGD 0 P4D 0 [ +0.000006] Oops: 0000 [#1] PREEMPT SMP NOPTI [ +0.000006] CPU: 15 PID: 2368 Comm: kms_force_conne Not tainted 6.5.0-asdn+ #152 [ +0.000005] Hardware name: HP HP ENVY x360 Convertible 13-ay1xxx/8929, BIOS F.01 07/14/2021 [ +0.000004] RIP: 0010:i2c_transfer+0xd/0x100 [ +0.000011] Code: ea fc ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 55 53 <48> 8b 47 10 48 89 fb 48 83 38 00 0f 84 b3 00 00 00 83 3d 2f 80 16 [ +0.000004] RSP: 0018:ffff9c4f89c0fad0 EFLAGS: 00010246 [ +0.000005] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000080 [ +0.000003] RDX: 0000000000000002 RSI: ffff9c4f89c0fb20 RDI: 00000000000004b0 [ +0.000003] RBP: ffff9c4f89c0fb80 R08: 0000000000000080 R09: ffff8d8e0b15b980 [ +0.000003] R10: 00000000000380e0 R11: 0000000000000000 R12: 0000000000000080 [ +0.000002] R13: 0000000000000002 R14: ffff9c4f89c0fb0e R15: ffff9c4f89c0fb0f [ +0.000004] FS: 00007f9ad2176c40(0000) GS:ffff8d90fe9c0000(0000) knlGS:0000000000000000 [ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000004] CR2: 00000000000004c0 CR3: 0000000121bc4000 CR4: 0000000000750ee0 [ +0.000003] PKRU: 55555554 [ +0.000003] Call Trace: [ +0.000006] <TASK> [ +0.000006] ? __die+0x23/0x70 [ +0.000011] ? page_fault_oops+0x17d/0x4c0 [ +0.000008] ? preempt_count_add+0x6e/0xa0 [ +0.000008] ? srso_alias_return_thunk+0x5/0x7f [ +0.000011] ? exc_page_fault+0x7f/0x180 [ +0.000009] ? asm_exc_page_fault+0x26/0x30 [ +0.000013] ? i2c_transfer+0xd/0x100 [ +0.000010] drm_do_probe_ddc_edid+0xc2/0x140 [drm] [ +0.000067] ? srso_alias_return_thunk+0x5/0x7f [ +0.000006] ? _drm_do_get_edid+0x97/0x3c0 [drm] [ +0.000043] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000042] edid_block_read+0x3b/0xd0 [drm] [ +0.000043] _drm_do_get_edid+0xb6/0x3c0 [drm] [ +0.000041] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000043] drm_edid_read_custom+0x37/0xd0 [drm] [ +0.000044] amdgpu_dm_connector_mode_valid+0x129/0x1d0 [amdgpu] [ +0.000153] drm_connector_mode_valid+0x3b/0x60 [drm_kms_helper] [ +0.000000] __drm_helper_update_and_validate+0xfe/0x3c0 [drm_kms_helper] [ +0.000000] ? amdgpu_dm_connector_get_modes+0xb6/0x520 [amdgpu] [ +0.000000] ? srso_alias_return_thunk+0x5/0x7f [ +0.000000] drm_helper_probe_single_connector_modes+0x2ab/0x540 [drm_kms_helper] [ +0.000000] status_store+0xb2/0x1f0 [drm] [ +0.000000] kernfs_fop_write_iter+0x136/0x1d0 [ +0.000000] vfs_write+0x24d/0x440 [ +0.000000] ksys_write+0x6f/0xf0 [ +0.000000] do_syscall_64+0x60/0xc0 [ +0.000000] ? srso_alias_return_thunk+0x5/0x7f [ +0.000000] ? syscall_exit_to_user_mode+0x2b/0x40 [ +0.000000] ? srso_alias_return_thunk+0x5/0x7f [ +0.000000] ? do_syscall_64+0x6c/0xc0 [ +0.000000] ? do_syscall_64+0x6c/0xc0 [ +0.000000] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ +0.000000] RIP: 0033:0x7f9ad46b4b00 [ +0.000000] Code: 40 00 48 8b 15 19 b3 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d e1 3a 0e 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 [ +0.000000] RSP: 002b:00007ffcbd3bd6d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ +0.000000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9ad46b4b00 [ +0.000000] RDX: 0000000000000002 RSI: 00007f9ad48a7417 RDI: 0000000000000009 [ +0.000000] RBP: 0000000000000002 R08 ---truncated---
[]
null
5.5
null
null
null
RHSA-2011:0320
Red Hat Security Advisory: libcgroup security update
libcgroup: Heap-based buffer overflow by converting list of controllers for given task into an array of strings libcgroup: Uncheck origin of NETLINK messages
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2014-1731
core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-jq8j-jpxh-5q66
Vulnerability in the MICROS Lucas component of Oracle Retail Applications (subcomponent: Security). Supported versions that are affected are 2.9.5.6 and 2.9.5.7. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Lucas. Successful attacks of this vulnerability can result in takeover of MICROS Lucas. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.5
null
null
GHSA-xj65-pmm9-g4xv
Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.x through 6.1.21 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.
[]
null
null
null
null
null
RHSA-2014:0927
Red Hat Security Advisory: qemu-kvm security and bug fix update
qemu: virtio-net: buffer overflow on invalid state load qemu: virtio-net: out-of-bounds buffer write on load qemu: virtio-net: out-of-bounds buffer write on invalid state load qemu: virtio: out-of-bounds buffer write on invalid state load qemu: hpet: buffer overrun on invalid state load qemu: hw/pci/pcie_aer.c: buffer overrun on invalid state load qemu: virtio: insufficient validation of num_sg when mapping qemu: virtio: insufficient validation of num_sg when mapping qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load qemu: virtio-scsi: buffer overrun on invalid state load qemu: virtio: buffer overrun on incoming migration qemu: virtio: out-of-bounds buffer write on state load with invalid config_len Qemu: qcow1: validate L2 table size to avoid integer overflows Qemu: qcow1: validate image size to avoid out-of-bounds memory access Qemu: usb: fix up post load checks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
RHSA-2022:5564
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: race condition in perf_event_open leads to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.4
null
null
null
RHSA-2020:1471
Red Hat Security Advisory: elfutils security update
elfutils: Double-free due to double decompression of sections in crafted ELF causes crash
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
4.3
null
null
GHSA-rxwx-q996-2rjp
Cross-site scripting (XSS) vulnerability in tiki-cookie-jar.php in TikiWiki CMS/Groupware before 8.2 and LTS before 6.5 allows remote attackers to inject arbitrary web script or HTML via arbitrary parameters.
[]
null
null
null
null
null
CVE-2020-35577
In Endalia Selection Portal before 4.205.0, an Insecure Direct Object Reference (IDOR) allows any authenticated user to download every file uploaded to the platform by changing the value of the file identifier (aka CommonDownload identification number).
[ "cpe:2.3:a:endalia:selection_portal:4.205.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
GHSA-3xff-pwwp-wxh5
This vulnerability, if exploited, allows an attacker to perform privileged RCE (Remote Code Execution) on machines with the Assets Discovery agent installed. The vulnerability exists between the Assets Discovery application (formerly known as Insight Discovery) and the Assets Discovery agent.Assets Discovery, which can be downloaded via Atlassian Marketplace, is a network scanning tool that can be used with or without an agent with Jira Service Management Cloud, Data Center or Server. It detects hardware and software that is connected to your local network and extracts detailed information about each asset. This data can then be imported into Assets in Jira Service Management to help you manage all of the devices and configuration items within your local network.
[]
null
null
9.8
null
null
CVE-2018-16147
The data parameter of the /settings/api/router endpoint in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to Cross-Site Scripting.
[ "cpe:2.3:a:opsview:opsview:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-pm5g-mcvv-5jvj
Unspecified vulnerability in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality via unknown vectors.
[]
null
null
null
null
null
GHSA-3rqr-2pp7-2956
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
[]
null
5.3
null
null
null
CVE-2008-0741
Unspecified vulnerability in the PropFilePasswordEncoder utility in IBM WebSphere Application Server (WAS) before 6.0.2 Fix Pack 25 (6.0.2.25) has unknown impact and attack vectors.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2008:0569
Red Hat Security Advisory: firefox security update
Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-x249-wwhp-9fc5
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded certificate for Ejabberd in ejabberd.pem.
[]
null
5.3
null
null
null
GHSA-79q6-rr59-764f
Cross-site scripting (XSS) vulnerability in search_de.html in foresite CMS allows remote attackers to inject arbitrary web script or HTML via the query parameter.
[]
null
null
null
null
null
GHSA-529m-7g8m-h28q
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12270.
[]
null
null
null
null
null
CVE-2011-1145
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
[ "cpe:2.3:a:unixodbc:unixodbc:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
RHSA-2015:1622
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 tomcat security update
tomcat: non-persistent DoS attack by feeding data by aborting an upload Tomcat/JbossWeb: security manager bypass via EL expressions
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6", "cpe:/a:redhat:jboss_enterprise_web_server:2::el7" ]
null
null
null
null
null
CVE-2015-5020
The Big SQL component in IBM InfoSphere BigInsights 3.0, 3.0.0.1, 3.0.0.2, and 4.0 allows remote authenticated users to bypass intended access restrictions and truncate arbitrary tables via unspecified vectors.
[ "cpe:2.3:a:ibm:infosphere_biginsights:3.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_biginsights:3.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_biginsights:3.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_biginsights:4.0.0.0:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
GHSA-37vj-5xqx-3r34
Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D7800 before 1.0.1.44, DM200 before 1.0.0.58, R7500v2 before 1.0.3.40, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.22, RBR20 before 2.3.0.22, RBS20 before 2.3.0.22, RBK50 before 2.3.0.22, RBR50 before 2.3.0.22, RBS50 before 2.3.0.22, RBS40 before 2.3.0.22, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.60, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, and WNR2000v5 before 1.0.0.68.
[]
null
null
null
null
null
CVE-2017-2911
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
[ "cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*" ]
null
null
9
null
null
GHSA-3q8r-f3pj-3gc4
Apache Airflow may allow authenticated users who have been deactivated to continue using the UI or API
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API.
[]
8.6
8.1
null
null
null
GHSA-8vmh-j4m8-xhc4
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Wow-Company Easy Digital Downloads – Recent Purchases allows PHP Remote File Inclusion.This issue affects Easy Digital Downloads – Recent Purchases: from n/a through 1.0.2.
[]
null
9.6
null
null
null
CVE-2021-47191
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() The following warning was observed running syzkaller: [ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in; [ 3813.830724] program syz-executor not setting count and/or reply_len properly [ 3813.836956] ================================================================== [ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0 [ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549 [ 3813.846612] Call Trace: [ 3813.846995] dump_stack+0x108/0x15f [ 3813.847524] print_address_description+0xa5/0x372 [ 3813.848243] kasan_report.cold+0x236/0x2a8 [ 3813.849439] check_memory_region+0x240/0x270 [ 3813.850094] memcpy+0x30/0x80 [ 3813.850553] sg_copy_buffer+0x157/0x1e0 [ 3813.853032] sg_copy_from_buffer+0x13/0x20 [ 3813.853660] fill_from_dev_buffer+0x135/0x370 [ 3813.854329] resp_readcap16+0x1ac/0x280 [ 3813.856917] schedule_resp+0x41f/0x1630 [ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0 [ 3813.862699] scsi_dispatch_cmd+0x330/0x950 [ 3813.863329] scsi_request_fn+0xd8e/0x1710 [ 3813.863946] __blk_run_queue+0x10b/0x230 [ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400 [ 3813.865220] sg_common_write.isra.0+0xe61/0x2420 [ 3813.871637] sg_write+0x6c8/0xef0 [ 3813.878853] __vfs_write+0xe4/0x800 [ 3813.883487] vfs_write+0x17b/0x530 [ 3813.884008] ksys_write+0x103/0x270 [ 3813.886268] __x64_sys_write+0x77/0xc0 [ 3813.886841] do_syscall_64+0x106/0x360 [ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 This issue can be reproduced with the following syzkaller log: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') open_by_handle_at(r1, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40782) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126) In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This leads to OOB in sg_copy_buffer(). To solve this issue, define alloc_len as u32.
[]
null
7.1
null
null
null
CVE-2023-41138
The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process.
[ "cpe:2.3:a:appsanywhere:appsanywhere_client:1.4.0:*:*:*:*:macos:*:*", "cpe:2.3:a:appsanywhere:appsanywhere_client:1.4.1:*:*:*:*:macos:*:*", "cpe:2.3:a:appsanywhere:appsanywhere_client:1.5.1:*:*:*:*:macos:*:*", "cpe:2.3:a:appsanywhere:appsanywhere_client:1.5.2:*:*:*:*:macos:*:*", "cpe:2.3:a:appsanywhere:appsanywhere_client:1.6.0:*:*:*:*:macos:*:*", "cpe:2.3:a:appsanywhere:appsanywhere_client:2.0.0:*:*:*:*:macos:*:*" ]
null
7.5
null
null
null
GHSA-3p8r-p4q5-mc44
Violation Comments to GitLab Plugin has Insufficiently Protected Credentials
Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.Violation Comments to GitLab Plugin now stores these credentials encrypted. Existing jobs need to have their configuration saved for existing plain text credentials to be overwritten.
[]
null
null
4.3
null
null
GHSA-f596-88pf-rrm5
Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProfilePress: from n/a through 4.13.2.
[]
null
5.3
null
null
null
CVE-2006-0563
SQL injection vulnerability in exec.php in PluggedOut Blog 1.9.9c allows remote attackers to execute arbitrary SQL commands via the entryid parameter in a comment_add action.
[ "cpe:2.3:a:pluggedout:pluggedout_blog:1.9.9c:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-18857
The NETGEAR Insight application before 2.42 for Android and iOS is affected by password mismanagement.
[ "cpe:2.3:a:netgear:insight:*:*:*:*:*:android:*:*", "cpe:2.3:a:netgear:insight:*:*:*:*:*:iphone_os:*:*" ]
null
9.8
null
7.5
null
GHSA-m4g5-6q8m-rhcg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 0.1.1.
[]
null
6.5
null
null
null
GHSA-w5g9-fxf7-88qg
The Motors – Car Dealer, Classifieds & Listing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the stm_edit_delete_user_car function in all versions up to, and including, 1.4.8. This makes it possible for unauthenticated attackers to unpublish arbitrary posts and pages.
[]
null
5.3
null
null
null
CVE-2020-4623
IBM i2 iBase 8.9.13 could allow a local authenticated attacker to execute arbitrary code on the system, caused by a DLL search order hijacking flaw. By using a specially-crafted .DLL file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 184984.
[ "cpe:2.3:a:ibm:i2_ibase:8.9.13:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.7
null
null
CVE-2012-1637
Cross-site scripting vulnerability (XSS) in the Quick Tabs module 6.x-2.x before 6.x-2.1, 6.x-3.x before 6.x-3.1, and 7.x-3.x before 7.x-3.3 for Drupal.
[ "cpe:2.3:a:drupal:quick_tabs:6.x-2.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:quick_tabs:6.x-3.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:quick_tabs:7.x-3.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:quick_tabs:7.x-3.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:quick_tabs:7.x-3.2:*:*:*:*:drupal:*:*" ]
null
4.8
null
3.5
null
RHSA-2008:0906
Red Hat Security Advisory: java-1.6.0-ibm security update
OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) OpenJDK JAX-WS unauthorized URL access (6542088) security flaw Security Vulnerabilities in the Java Runtime Environment Scripting Language Support (6529568, 6529579) security flaw Java Web Start, arbitrary file creation (6703909) Java Web Start, untrusted application may determine Cache Location (6704074)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
null
CVE-2018-19349
In SeaCMS v6.64, there is SQL injection via the admin_makehtml.php topic parameter because of mishandling in include/mkhtml.func.php.
[ "cpe:2.3:a:seacms:seacms:6.64:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null