id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-g985-jjm8-vhcp
|
MONITORAPP AIWAF-VE and AIWAF-4000 through 2020-06-16 allow reflected Cross-Site Scripting (XSS) through a crafted URL. This occurs because the Detect URL field displays the original URL.
|
[] | null | null | null | null |
|
GHSA-5x9j-qq7v-qfgj
|
Windows Image Acquisition Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null |
|
GHSA-ghgp-g2w8-92pm
|
In the l2tp subsystem, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152409173
|
[] | null | null | null | null |
|
GHSA-8cpm-p3f3-45f7
|
File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the "sendreply.php" file, and the uploaded file was received using the "$- FILES" variable.
|
[] | null | 8.8 | null | null |
|
CVE-2024-39472
|
xfs: fix log recovery buffer allocation for the legacy h_size fixup
|
In the Linux kernel, the following vulnerability has been resolved:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
Commit a70f9fe52daa ("xfs: detect and handle invalid iclog size set by
mkfs") added a fixup for incorrect h_size values used for the initial
umount record in old xfsprogs versions. Later commit 0c771b99d6c9
("xfs: clean up calculation of LR header blocks") cleaned up the log
reover buffer calculation, but stoped using the fixed up h_size value
to size the log recovery buffer, which can lead to an out of bounds
access when the incorrect h_size does not come from the old mkfs
tool, but a fuzzer.
Fix this by open coding xlog_logrec_hblks and taking the fixed h_size
into account for this calculation.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-rwg6-5v43-7mq2
|
Windows Update Stack Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null |
|
CVE-2008-2378
|
Untrusted search path vulnerability in hfkernel in hf 0.7.3 and 0.8 allows local users to gain privileges via a Trojan horse killall program in a directory in the PATH, related to improper handling of the -k option.
|
[
"cpe:2.3:a:hf:hf:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hf:hf:0.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-chpw-rq32-9rp2
|
SQL injection vulnerability in the REST API in dotCMS before 3.3.2 allows remote attackers to execute arbitrary SQL commands via the stName parameter to api/content/save/1.
|
[] | null | null | 9.8 | null |
|
CVE-2001-0304
|
Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request.
|
[
"cpe:2.3:a:caucho_technology:resin:1.2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-28028
|
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v5 parameter.
|
[] | null | 7.3 | null | null |
|
GHSA-q7rv-p9gv-mcj9
|
Foxit PDF Reader Annotation Use of Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14658.
|
[] | null | null | 7.8 | null |
|
CVE-2017-14842
|
Mojoomla SMSmaster Multipurpose SMS Gateway for WordPress allows SQL Injection via the id parameter.
|
[
"cpe:2.3:a:dasinfomedia:smsmaster_multipurpose_sms_gateway:-:*:*:*:*:wordpress:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-xqjx-3pwp-3529
|
The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.1 via the eli_option_value shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract arbitrary options from the wp_options table.
|
[] | null | 4.3 | null | null |
|
CVE-2012-2713
|
Cross-site request forgery (CSRF) vulnerability in the BrowserID (Mozilla Persona) module 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that login a user to another web site.
|
[
"cpe:2.3:a:browserid_project:browserid:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:browserid_project:browserid:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-wwfp-p79h-2x5v
|
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter.
|
[] | null | 6.1 | null | null |
|
CVE-2021-41168
|
Hash-Collision Denial-of-Service Vulnerability in snudown
|
Snudown is a reddit-specific fork of the Sundown Markdown parser used by GitHub, with Python integration added. In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown ` [reference_name]: https://www.example.com` are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further the hash table allowed for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Users are advised to update to version 1.7.0.
|
[
"cpe:2.3:a:reddit:snudown:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2025-27056
|
Use After Free in DSP Service
|
Memory corruption during sub-system restart while processing clean-up to free up resources.
|
[] | null | 7.8 | null | null |
GHSA-hp5p-vj7v-2q7w
|
Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.5.1C, allows local users to use a utility program to obtain the group password.
|
[] | null | null | null | null |
|
RHSA-2017:2731
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
CVE-2016-3502
|
Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 11.1.1.8 and 12.2.1.0 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:webcenter_sites:11.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_sites:12.2.1.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6 |
|
GHSA-3fvw-g6mr-w247
|
ChakraCore RCE Vulnerability
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8133, CVE-2018-8145, CVE-2018-8177.
|
[] | null | null | 7.5 | null |
GHSA-h876-4pvm-cp76
|
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/bad.php.
|
[] | null | null | null | null |
|
GHSA-3x89-96hq-8v55
|
Directory traversal vulnerability in PHPJabbers Appointment Scheduler 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter in a pjActionDownload action to the pjBackup controller.
|
[] | null | null | null | null |
|
GHSA-r85x-frw7-26xj
|
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19070)
|
[] | null | 7.8 | null | null |
|
GHSA-hxj5-vprr-w32x
|
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 209515.
|
[] | null | null | null | null |
|
GHSA-2qc9-hx55-p47v
|
Hosting Controller 6.1 stores forum/db/forum.mdb under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as user name and password credentials. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] | null | null | null | null |
|
GHSA-jwc2-228h-vcwr
|
Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Search and Register Users). Supported versions that are affected are 12.2.4-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle User Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | 7.5 | null | null |
|
GHSA-mhff-vjcm-vqcc
|
Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0613.
|
[] | null | null | null | null |
|
CVE-2012-1175
|
Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow.
|
[
"cpe:2.3:a:gnu:gnash:0.8.10:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2001-0081
|
swinit in nCipher does not properly disable the Operator Card Set recovery feature even when explicitly disabled by the user, which could allow attackers to gain access to application keys.
|
[
"cpe:2.3:a:ncipher:ncipher:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-13139
|
wangl1989 mysiteforme FileController doContent server-side request forgery
|
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-g7pr-q92w-4h65
|
Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Security Server 8.95.J1 has unknown impact and attack vectors, aka Vuln# JDE01.
|
[] | null | null | null | null |
|
RHSA-2004:586
|
Red Hat Security Advisory: glibc security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:3976
|
Red Hat Security Advisory: tcpdump security update
|
tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
CVE-2023-5714
|
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_db_specs() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve data key specs.
|
[
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2024-27331
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22287.
|
[] | null | null | 3.3 | null |
GHSA-pj3v-9cm8-gvj8
|
tRPC 11 WebSocket DoS Vulnerability
|
SummaryAn unhandled error is thrown when validating invalid connectionParams which crashes a tRPC WebSocket server. This allows any unauthenticated user to crash a tRPC 11 WebSocket server.DetailsAny tRPC 11 server with WebSocket enabled with a `createContext` method set is vulnerable. Here is an example:https://github.com/user-attachments/assets/ce1b2d32-6103-4e54-8446-51535b293b05I have a working reproduction here if you would like to test: https://github.com/lukechilds/trpc-vuln-reproductionThe connectionParams logic introduced in https://github.com/trpc/trpc/pull/5839 does not safely handle invalid connectionParams objects. During validation if the object does not match an expected shape an error will be thrown:https://github.com/trpc/trpc/blob/8cef54eaf95d8abc8484fe1d454b6620eeb57f2f/packages/server/src/unstable-core-do-not-import/http/parseConnectionParams.ts#L27-L33This is called during WebSocket connection setup inside `createCtxPromise()` here:https://github.com/trpc/trpc/blob/8cef54eaf95d8abc8484fe1d454b6620eeb57f2f/packages/server/src/adapters/ws.ts#L435`createCtxPromise` has handling to catch any errors and pass them up to the `opts.onError` handler:https://github.com/trpc/trpc/blob/8cef54eaf95d8abc8484fe1d454b6620eeb57f2f/packages/server/src/adapters/ws.ts#L144-L173However the error handler then rethrows the error:https://github.com/trpc/trpc/blob/8cef54eaf95d8abc8484fe1d454b6620eeb57f2f/packages/server/src/adapters/ws.ts#L171Since this is all triggered from the WebSocket `message` event there is no higher level error handling so this causes an uncaught exception and crashes the server process.This means any tRPC 11 server with WebSockets enabled can be crashed by an attacker sending an invalid connectionParams object. It doesn't matter if the server doesn't make user of connectionParams, the connectionParams logic can be initiated by the client.To fix this vulnerability tRPC should not rethrow the error after it's be handled. This patch fixes the vulnerability:PoCThis script will crash the target tRPC 11 server if WebSockets are enabled:Complete PoC with vulnerable WebSocket server here: https://github.com/lukechilds/trpc-vuln-reproduction
|
[] | 8.7 | null | null | null |
GHSA-vcgj-3gwq-4x48
|
The Vision Interactive For WordPress plugin through 1.5.3 does not sanitise and escape some of its settings, which could allow users such as contributor+ to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
[] | null | 5.4 | null | null |
|
CVE-2019-12177
|
Privilege escalation due to insecure directory permissions affecting ViveportDesktopService in HTC VIVEPORT before 1.0.0.36 allows local attackers to escalate privileges via DLL hijacking.
|
[
"cpe:2.3:a:htc:viveport:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-78m7-2mh5-9jvw
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1742, CVE-2015-1747, CVE-2015-1750, and CVE-2015-1753.
|
[] | null | null | null | null |
|
GHSA-2p6p-6m75-rrxf
|
An issue was discovered in Repute ARForms 3.5.1 and prior. An attacker is able to delete any file on the server with web server privileges by sending a malicious request to admin-ajax.php.
|
[] | null | null | 7.5 | null |
|
CVE-2006-4317
|
Cross-site scripting (XSS) vulnerability in attachment.php in WoltLab Burning Board (WBB) 2.3.5 allows remote attackers to inject arbitrary web script or HTML via a GIF image that contains URL-encoded Javascript.
|
[
"cpe:2.3:a:woltlab:burning_board:2.3.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2018:1668
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
CVE-2024-34543
|
Improper access control in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:raid_web_console:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:raid_web_console:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2021-38120
|
Remote Code Execution using Bash command Injection in backup scheduling functionality in NetIQ Advance Authentication
|
A vulnerability identified in Advance Authentication that allows bash command Injection in administrative controlled functionality of backup due to improper
handling in provided command parameters. This issue affects NetIQ Advance Authentication version before 6.3.5.1.
|
[
"cpe:2.3:a:microfocus:netiq_advanced_authentication:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:-:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_advanced_authentication:6.3:sp5:*:*:*:*:*:*"
] | null | 5.1 | null | null |
CVE-2022-47211
|
Microsoft Office Graphics Remote Code Execution Vulnerability
|
Microsoft Office Graphics Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"
] | null | 7.8 | null | null |
RHSA-2022:0161
|
Red Hat Security Advisory: java-17-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
GHSA-658x-wm6w-jc3v
|
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.9 allows remote attackers to affect confidentiality via vectors related to OSSL Module.
|
[] | null | null | null | null |
|
GHSA-7m3p-hh8m-pwmh
|
libpng 1.6.37 has memory leaks in png_malloc_warn and png_create_info_struct.
|
[] | null | 6.5 | null | null |
|
CVE-2006-5824
|
Integer overflow in the ffs_rdextattr function in FreeBSD 6.1 allows local users to cause a denial of service (kernel panic) and trigger a heap-based buffer overflow via a crafted UFS filesystem, a different vulnerability than CVE-2006-5679. NOTE: a third party states that this issue does not cross privilege boundaries in FreeBSD because only root may mount a filesystem.
|
[
"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-rmfh-4vqx-qf9v
|
In rw_t2t_extract_default_locks_info of rw_t2t_ndef.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147310721
|
[] | null | null | null | null |
|
CVE-2000-0847
|
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header.
|
[
"cpe:2.3:a:university_of_washington:imap:4.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_washington:imap:4.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m263-3fx7-gm9v
|
A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device. This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information.
|
[] | null | 7.1 | null | null |
|
RHSA-2008:0862
|
Red Hat Security Advisory: tomcat security update
|
Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
|
[
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
CVE-2022-38105
|
An information disclosure vulnerability exists in the cm_processREQ_NC opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packets can lead to a disclosure of sensitive information. An attacker can send a network request to trigger this vulnerability.
|
[
"cpe:2.3:o:asus:rt-ax82u_firmware:3.0.0.4.386_49674-ge182230:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-f4qp-f7wx-8c33
|
Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted web site.
|
[] | null | null | null | null |
|
GHSA-pg9w-32jf-9x5r
|
An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
|
[] | null | null | 7.8 | null |
|
CVE-2003-0877
|
Mac OS X before 10.3 with core files enabled allows local users to overwrite arbitrary files and read core files via a symlink attack on core files that are created with predictable names in the /cores directory.
|
[
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2013-3571
|
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
|
[
"cpe:2.3:a:dest-unreach:socat:1.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
RHSA-2022:6833
|
Red Hat Security Advisory: expat security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.1 | null | null |
CVE-2024-24772
|
Apache Superset: Improper Neutralisation of custom SQL on embedded context
|
A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1.
Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
|
[
"cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2014-9933
|
Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2025-48997
|
Multer vulnerable to Denial of Service via unhandled exception
|
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available.
|
[] | 8.7 | null | null | null |
CVE-2021-45950
|
LibreDWG 0.12.4.4313 through 0.12.4.4367 has an out-of-bounds write in dwg_free_BLOCK_private (called from dwg_free_BLOCK and dwg_free_object).
|
[
"cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-8c3c-7fv5-236c
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null |
|
GHSA-mjgv-gvww-c6jv
|
The Clockwork SMS clockwork-test-message.php component has XSS via a crafted "to" parameter in a clockwork-test-message request to wp-admin/admin.php. This component code is found in the following WordPress plugins: Clockwork Free and Paid SMS Notifications 2.0.3, Two-Factor Authentication - Clockwork SMS 1.0.2, Booking Calendar - Clockwork SMS 1.0.5, Contact Form 7 - Clockwork SMS 2.3.0, Fast Secure Contact Form - Clockwork SMS 2.1.2, Formidable - Clockwork SMS 1.0.2, Gravity Forms - Clockwork SMS 2.2, and WP e-Commerce - Clockwork SMS 2.0.5.
|
[] | null | 6.1 | null | null |
|
CVE-2006-4711
|
Multiple cross-site scripting (XSS) vulnerabilities in Sage allow remote attackers to inject arbitrary web script or HTML via an Atom 1.0 feed, as demonstrated by certain test cases of the James M. Snell Atom 1.0 feed reader test suite.
|
[
"cpe:2.3:a:sage:sage:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-4010
|
An exploitable code execution vulnerability exists in the connect functionality of ProtonVPN VPN client 1.5.1. A specially crafted configuration file can cause a privilege escalation, resulting in the ability to execute arbitrary commands with the system's privileges.
|
[
"cpe:2.3:a:protonvpn:protonvpn:1.5.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-x7p5-rc62-6px9
|
Unspecified vulnerability in HP Operations Agent 11.00 and Performance Agent 4.73 and 5.0 on AIX, HP-UX, Linux, and Solaris allows local users to bypass intended directory-access restrictions via unknown vectors.
|
[] | null | null | null | null |
|
GHSA-r4j6-f9x3-8g4r
|
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
|
[] | null | null | null | null |
|
GHSA-r3m2-54q4-vqvq
|
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
|
[] | null | null | null | null |
|
CVE-2014-0274
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0270, CVE-2014-0273, and CVE-2014-0288.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-69gf-2w85-7g9q
|
A vulnerability in the implementation of the Intermediate System–to–Intermediate System (IS–IS) routing protocol functionality in Cisco IOS XR Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the IS–IS process. The vulnerability is due to improper handling of a Simple Network Management Protocol (SNMP) request for specific Object Identifiers (OIDs) by the IS–IS process. An attacker could exploit this vulnerability by sending a crafted SNMP request to the affected device. A successful exploit could allow the attacker to cause a DoS condition in the IS–IS process.
|
[] | null | 6.5 | null | null |
|
CVE-2016-7592
|
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
GHSA-f88x-85xm-m4m8
|
Multiple SQL injection vulnerabilities in NetCracker Resource Management System before 8.2 allow remote authenticated users to execute arbitrary SQL commands via the (1) ctrl, (2) h____%2427, (3) h____%2439, (4) param0, (5) param1, (6) param2, (7) param3, (8) param4, (9) filter_INSERT_COUNT, (10) filter_MINOR_FALLOUT, (11) filter_UPDATE_COUNT, (12) sort, or (13) sessid parameter.
|
[] | null | null | null | null |
|
GHSA-q5h5-q6xv-vq45
|
PHP remote file inclusion vulnerability in includes/functions_common.php in the VWar Account module (vWar_Account) in PHPNuke Clan 3.0.1 allows remote attackers to include arbitrary files via a URL in the vwar_root2 parameter. NOTE: it is possible that this issue stems from a problem in VWar itself, but this is not clear.
|
[] | null | null | null | null |
|
CVE-2023-35352
|
Windows Remote Desktop Security Feature Bypass Vulnerability
|
Windows Remote Desktop Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4645:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1850:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6085:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24374:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.21063:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.21075:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-c4hp-hwrc-92r3
|
The BuddyForms WordPress plugin, in versions prior to 2.7.8, was affected by an unauthenticated insecure deserialization issue. An unauthenticated attacker could leverage this issue to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
|
[] | null | 9.8 | null | null |
|
GHSA-6q86-57jm-rpfx
|
Unrestricted file upload vulnerability in ScriptsFeed Auto Classifieds allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension as a profile logo, then accessing it via a direct request to the file in cars_images/.
|
[] | null | null | null | null |
|
CVE-2004-2032
|
Netgear RP114 allows remote attackers to bypass the keyword based URL filtering by requesting a long URL, as demonstrated using a large number of %20 (hex-encoded space) sequences.
|
[
"cpe:2.3:h:netgear:rp114:3.26:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-1458
|
Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in razorCMS before 0.4 allow remote attackers to inject arbitrary web script or HTML via (1) the slab parameter in an edit action, (2) the catname parameter in a showcats action, and (3) the cat parameter in a reordercat action.
|
[
"cpe:2.3:a:razorcms:razorcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:razorcms:razorcms:0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-r23g-j848-x8p6
|
An issue found in Wondershare Technology Co.,Ltd PDFelement v9.1.1 allows a remote attacker to execute arbitrary commands via the pdfelement-pro_setup_full5239.exe file.
|
[] | null | 7.8 | null | null |
|
CVE-2008-4717
|
SQL injection vulnerability in bannerclick.php in ZEELYRICS 2.0 allows remote attackers to execute arbitrary SQL commands via the adid parameter.
|
[
"cpe:2.3:a:zeeways:zeelyrics:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-c2vr-rq29-m6g9
|
The President Clicker (aka com.flexymind.pclicker) application 1.0.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null |
|
GHSA-qhr9-wjgv-2r72
|
By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108.
|
[] | null | 4.3 | null | null |
|
CVE-2023-26590
|
Floating point exception in src/aiff.c
|
A floating point exception vulnerability was found in sox, in the lsx_aiffstartwrite function at sox/src/aiff.c:622:58. This flaw can lead to a denial of service.
|
[
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:2.3:a:sox_project:sox:14.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
GHSA-h7c5-prm2-m6vj
|
The next_text function in src/libmpg123/id3.c in mpg123 1.24.0 allows remote attackers to cause a denial of service (buffer over-read) via a crafted mp3 file.
|
[] | null | null | 5.5 | null |
|
CVE-2024-34748
|
In _DevmemXReservationPageAddress of devicemem_server.c, there is a possible use-after-free due to improper casting. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8.4 | null | null |
|
CVE-2024-26877
|
crypto: xilinx - call finalize with bh disabled
|
In the Linux kernel, the following vulnerability has been resolved:
crypto: xilinx - call finalize with bh disabled
When calling crypto_finalize_request, BH should be disabled to avoid
triggering the following calltrace:
------------[ cut here ]------------
WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118
Modules linked in: cryptodev(O)
CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G O 6.8.0-rc1-yocto-standard #323
Hardware name: ZynqMP ZCU102 Rev1.0 (DT)
pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : crypto_finalize_request+0xa0/0x118
lr : crypto_finalize_request+0x104/0x118
sp : ffffffc085353ce0
x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688
x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00
x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000
x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0
x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8
x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001
x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000
x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000
Call trace:
crypto_finalize_request+0xa0/0x118
crypto_finalize_aead_request+0x18/0x30
zynqmp_handle_aes_req+0xcc/0x388
crypto_pump_work+0x168/0x2d8
kthread_worker_fn+0xfc/0x3a0
kthread+0x118/0x138
ret_from_fork+0x10/0x20
irq event stamp: 40
hardirqs last enabled at (39): [<ffffffc0812416f8>] _raw_spin_unlock_irqrestore+0x70/0xb0
hardirqs last disabled at (40): [<ffffffc08122d208>] el1_dbg+0x28/0x90
softirqs last enabled at (36): [<ffffffc080017dec>] kernel_neon_begin+0x8c/0xf0
softirqs last disabled at (34): [<ffffffc080017dc0>] kernel_neon_begin+0x60/0xf0
---[ end trace 0000000000000000 ]---
|
[] | null | null | null | null |
GHSA-hfr6-3rjr-jmhf
|
The Leagoo P1 device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains a pre-installed platform app with a package name of com.wtk.factory (versionCode=1, versionName=1.0) that contains an exported broadcast receiver named com.wtk.factory.MMITestReceiver allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app.
|
[] | null | null | null | null |
|
GHSA-xfxv-r6vq-hqq8
|
Online Ordering System 2.3.2 is vulnerable to SQL Injection via /ordering/admin/stockin/index.php?view=edit&id=.
|
[] | null | 9.8 | null | null |
|
CVE-2024-5217
|
Incomplete Input Validation in GlideExpression Script
|
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
|
[
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*"
] | 9.2 | 9.8 | null | null |
GHSA-43pm-h7c8-jr2m
|
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, and CVE-2018-0781.
|
[] | null | null | 7.5 | null |
|
CVE-2002-0659
|
The ASN1 library in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allows remote attackers to cause a denial of service via invalid encodings.
|
[
"cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:corporate_time_outlook_connector:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-pvv4-8wmw-vjf3
|
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.
|
[] | null | 9.8 | null | null |
|
CVE-2005-3860
|
PHP remote file inclusion vulnerability in athena.php in Oliver May Athena PHP Website Administration 0.1a allows remote attackers to execute arbitrary PHP code via a URL in the athena_dir parameter.
|
[
"cpe:2.3:a:oliver_may:athena_php_website_administration:0.1a:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6gwm-q2fh-qvhr
|
NVIDIA GPU Display Driver contains a vulnerability in the DirectX and OpenGL Usermode drivers where a specially crafted pixel shader can cause infinite recursion leading to denial of service.
|
[] | null | null | 5.5 | null |
|
GHSA-qqhm-4g64-2g2j
|
Cross-Site Request Forgery (CSRF) vulnerability in axima Pays – WooCommerce Payment Gateway allows Stored XSS. This issue affects Pays – WooCommerce Payment Gateway: from n/a through 2.6.
|
[] | null | 7.1 | null | null |
|
CVE-2022-27337
|
A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
|
[
"cpe:2.3:a:freedesktop:poppler:22.03.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-pggv-hx2h-g5h6
|
PHP remote file inclusion vulnerability in inhalt.php in LightRO CMS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the dateien[news] parameter.
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.