id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-41216
|
D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability
|
D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21616.
|
[
"cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
CVE-2016-8209
|
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.
|
[
"cpe:2.3:o:brocade:netiron_mlx_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_mlxe-16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_mlxe-32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_mlxe-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_mlxe-8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:netiron_cer_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_cer_2024c-4x-rt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_cer_2024f-4x-rt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_cer_2024f-rt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_cer_2048fx-rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:netiron_ces_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_ces_2024c-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_ces_2024f-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_ces_2048fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:netiron_xmr_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_xmr_16000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_xmr_32000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_xmr_4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brocade:netiron_xmr_8000:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2001-0763
|
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
|
[
"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-1628
|
Simple SEO <= 1.7.91 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Simple SEO plugin for WordPress is vulnerable to attribute-based stored Cross-Site Scripting in versions up to, and including 1.7.91, due to insufficient sanitization or escaping on the SEO social and standard title parameters. This can be exploited by authenticated users with Contributor and above permissions to inject arbitrary web scripts into posts/pages that execute whenever an administrator access the page.
|
[
"cpe:2.3:a:coleds:simple_seo:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
GHSA-93h9-hmfg-qcx2
|
Buffalo WNC01WH devices with firmware version 1.0.0.8 and earlier allow remote attackers to cause a denial of service against the management screen via unspecified vectors.
|
[] | null | null | 6.5 | null |
|
GHSA-7922-2gj2-vj5c
|
SQL injection vulnerability in rss.php in MyBB (aka MyBulletinBoard) 1.1.1 allows remote attackers to execute arbitrary SQL commands via the comma parameter. NOTE: it is not clear from the original report how this attack can succeed, since the demonstration URL uses a variable that is overwritten with static data in the extracted source code.
|
[] | null | null | null | null |
|
CVE-2024-34468
|
Rukovoditel before 3.5.3 allows XSS via user_photo to My Page.
|
[] | null | 6.1 | null | null |
|
GHSA-8g6v-7hg5-2pqq
|
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158414.
|
[] | null | 5.4 | null | null |
|
RHSA-2024:1751
|
Red Hat Security Advisory: unbound security update
|
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
GHSA-cpf5-7x3j-9fcc
|
The Debian build procedure for the smokeping package in wheezy before 2.6.8-2+deb7u1 and jessie before 2.6.9-1+deb8u1 does not properly configure the way Apache httpd passes arguments to smokeping_cgi, which allows remote attackers to execute arbitrary code via crafted CGI arguments.
|
[] | null | null | null | null |
|
CVE-2014-5708
|
The Best Racing/moto Games Ranking (aka com.subapp.android.racing) application 2.2.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:gameinfo:best_racing\\/moto_games_ranking:2.2.7:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-f2f5-xcrp-m3x6
|
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
|
GHSA-f3mg-5wj9-94hh
|
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
|
[] | null | null | null | null |
|
CVE-2012-2532
|
Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
|
[
"cpe:2.3:a:microsoft:ftp_service:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ftp_service:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:itanium:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:itanium:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-1414
|
Multiple PHP remote file inclusion vulnerabilities in Coppermine Photo Gallery (CPG) allow remote attackers to execute arbitrary PHP code via a URL in the (1) cmd parameter to (a) image_processor.php or (b) picmgmt.inc.php, or the (2) path parameter to (c) include/functions.php, (d) include/plugin_api.inc.php, (e) index.php, or (f) pluginmgr.php.
|
[
"cpe:2.3:a:coppermine:coppermine_photo_gallery:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2015:0729
|
Red Hat Security Advisory: setroubleshoot security update
|
setroubleshoot: command injection via crafted file name
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2022-44032
|
An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
CVE-2023-38069
|
In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases
|
[
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2007-2281
|
Integer overflow in the _ncp32._NtrpTCPReceiveMsg function in rds.exe in the Cell Manager Database Service in the Application Recovery Manager component in HP OpenView Storage Data Protector 5.50 and 6.0 allows remote attackers to execute arbitrary code via a large value in the size parameter.
|
[
"cpe:2.3:a:hp:openview_storage_data_protector:5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_storage_data_protector:6.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-vfqh-j3mg-95c7
|
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
|
[] | null | null | 7.8 | null |
|
CVE-2014-2005
|
Sophos Disk Encryption (SDE) 5.x in Sophos Enterprise Console (SEC) 5.x before 5.2.2 does not enforce intended authentication requirements for a resume action from sleep mode, which allows physically proximate attackers to obtain desktop access by leveraging the absence of a login screen.
|
[
"cpe:2.3:a:sophos:enterprise_console:*:r2:*:*:*:*:*:*",
"cpe:2.3:a:sophos:enterprise_console:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:enterprise_console:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:enterprise_console:5.2.1:*:*:*:*:*:*:*"
] | null | 6.8 | null | 6.9 |
|
GHSA-qm4c-x73m-f8mf
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: prevent nf_skb_duplicated corruptionsyzbot found that nf_dup_ipv4() or nf_dup_ipv6() could write
per-cpu variable nf_skb_duplicated in an unsafe way [1].Disabling preemption as hinted by the splat is not enough,
we have to disable soft interrupts as well.[1]
BUG: using __this_cpu_write() in preemptible [00000000] code: syz.4.282/6316
caller is nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
CPU: 0 UID: 0 PID: 6316 Comm: syz.4.282 Not tainted 6.11.0-rc7-syzkaller-00104-g7052622fccb1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:93 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49
nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
nft_dup_ipv4_eval+0x1db/0x300 net/ipv4/netfilter/nft_dup_ipv4.c:30
expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
nft_do_chain_ipv4+0x202/0x320 net/netfilter/nft_chain_filter.c:23
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook+0x2c4/0x450 include/linux/netfilter.h:269
NF_HOOK_COND include/linux/netfilter.h:302 [inline]
ip_output+0x185/0x230 net/ipv4/ip_output.c:433
ip_local_out net/ipv4/ip_output.c:129 [inline]
ip_send_skb+0x74/0x100 net/ipv4/ip_output.c:1495
udp_send_skb+0xacf/0x1650 net/ipv4/udp.c:981
udp_sendmsg+0x1c21/0x2a60 net/ipv4/udp.c:1269
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x1a6/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
___sys_sendmsg net/socket.c:2651 [inline]
__sys_sendmmsg+0x3b2/0x740 net/socket.c:2737
__do_sys_sendmmsg net/socket.c:2766 [inline]
__se_sys_sendmmsg net/socket.c:2763 [inline]
__x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2763
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4ce4f7def9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4ce5d4a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f4ce5135f80 RCX: 00007f4ce4f7def9
RDX: 0000000000000001 RSI: 0000000020005d40 RDI: 0000000000000006
RBP: 00007f4ce4ff0b76 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f4ce5135f80 R15: 00007ffd4cbc6d68
</TASK>
|
[] | null | 5.5 | null | null |
|
GHSA-2prh-76mq-h4gx
|
DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file.
|
[] | null | 9.8 | null | null |
|
CVE-2025-25241
|
Missing Authorization check in SAP Fiori Apps Reference Library (My Overtime Requests)
|
Due to a missing authorization check, an attacker who is logged in to application can view/ delete �My Overtime Requests� which could allow the attacker to access employee information. This leads to low impact on confidentiality, integrity of the application. There is no impact on availability.
|
[] | null | 5.4 | null | null |
CVE-2021-31404
|
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
|
Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
|
[
"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*"
] | null | 4 | null | null |
GHSA-h7fr-8788-39j9
|
A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
|
[] | null | 7.8 | null | null |
|
GHSA-w32f-gmjx-6c8m
|
"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"
|
[] | null | 3.9 | null | null |
|
GHSA-84qv-px44-6mp2
|
Rejected reason: Not used
|
[] | null | null | null | null |
|
GHSA-5wfr-vhgw-3392
|
SQL injection vulnerability in Gravity Board X (GBX) 1.1 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the login field.
|
[] | null | null | null | null |
|
GHSA-x9r5-jxvq-4387
|
jquery.terminal self XSS on user input
|
ImpactThis is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees.Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because the javascript code inside html attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible.PatchesFixed version 2.31.1WorkaroundsThe user can use formatting that wrap whole user input and it's no op.The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).ReferencesThe issue was reported here [jcubic/jquery.terminal#727](https://github.com/jcubic/jquery.terminal/issues/727)For more informationIf you have any questions or comments about this advisory:Open an issue in [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal)Email us at [jcubic@onet.pl](mailto:jcubic@onet.pl)
|
[] | null | 3.7 | null | null |
CVE-2009-0729
|
Multiple directory traversal vulnerabilities in Page Engine CMS 2.0 Basic and Pro allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the fPrefix parameter to (1) modules/recent_poll_include.php, (2) modules/login_include.php, and (3) modules/statistics_include.php and (4) configuration.inc.php in includes/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:lingx:page_engine_cms:2.0:-:basic:*:*:*:*:*",
"cpe:2.3:a:lingx:page_engine_cms:2.0:-:pro:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-r364-m2j9-mf4h
|
gradio Server-Side Request Forgery vulnerability
|
An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
|
[] | null | null | 7.3 | null |
CVE-1999-1305
|
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.
|
[
"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2019-20919
|
An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
|
[
"cpe:2.3:a:perl:dbi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 4.7 | null | 1.9 |
|
GHSA-29pp-r8q7-mhv8
|
saned in sane-backends 1.0.7 and earlier, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault).
|
[] | null | null | null | null |
|
CVE-2021-33351
|
Cross Site Scripting Vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before and fixed in v.1.3.7 allows attackers to escalte privileges via a crafted payload in the ticket message field.
|
[
"cpe:2.3:a:wyomind:help_desk:*:*:*:*:*:magento_2:*:*"
] | null | 9 | null | null |
|
CVE-2025-24054
|
NTLM Hash Disclosure Spoofing Vulnerability
|
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
|
[] | null | 6.5 | null | null |
GHSA-gqj9-g6j7-jf68
|
Missing Authorization vulnerability in AWESOME TOGI Product Category Tree allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Category Tree: from n/a through 2.5.
|
[] | null | 5.3 | null | null |
|
CVE-2024-57433
|
macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.
|
[] | null | 7.5 | null | null |
|
GHSA-r7wc-3m9j-jf5m
|
Online News Portal using PHP/MySQLi 1.0 is affected by cross-site scripting (XSS) which allows remote attackers to inject an arbitrary web script or HTML via the "Title" parameter.
|
[] | null | null | null | null |
|
GHSA-mghh-jfj9-v2hx
|
Cross-site scripting (XSS) vulnerability in WebExpert allows remote attackers to inject arbitrary web script or HTML via a crafted User-Agent HTTP header.
|
[] | null | null | null | null |
|
CVE-2005-1125
|
Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded applications, allows attackers to bypass libsafe protection and exploit other vulnerabilities before the _libsafe_die function call is completed.
|
[
"cpe:2.3:a:avaya:libsafe:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:libsafe:2.0.16:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2019-19484
|
Open redirect via parameter ‘p’ in login.php in Centreon (19.04.4 and below) allows an attacker to craft a payload and execute unintended behavior.
|
[
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
GHSA-phfp-fpw5-wg8h
|
Cross-site scripting (XSS) vulnerability in the Freetag before 2.96 plugin for S9Y Serendipity, when using Internet Explorer 6 or 7, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to plugin/tag/.
|
[] | null | null | null | null |
|
CVE-2024-42446
|
TOCTOU in SmmWhea
|
APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution.
|
[] | null | 7.5 | null | null |
GHSA-pjxp-f379-6284
|
Malicious Package in @fangrong/xoc
|
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationRemove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 1.0.5
|
[] | null | null | null | null |
GHSA-62p8-cgx7-wgwx
|
The ff_frame_thread_init function in libavcodec/pthread_frame.c in FFmpeg before 2.7.2 mishandles certain memory-allocation failures, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via a crafted file, as demonstrated by an AVI file.
|
[] | null | null | null | null |
|
CVE-2020-10789
|
openITCOCKPIT before 3.7.3 has a web-based terminal that allows attackers to execute arbitrary OS commands via shell metacharacters that are mishandled on an su command line in app/Lib/SudoMessageInterface.php.
|
[
"cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2025-30848
|
WordPress Hostel plugin <= 1.1.5 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Hostel allows Reflected XSS. This issue affects Hostel: from n/a through 1.1.5.
|
[] | null | 7.1 | null | null |
GHSA-wc9x-r2g7-vjwr
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch MailMunch – Grow your Email List allows Stored XSS.This issue affects MailMunch – Grow your Email List: from n/a through 3.1.6.
|
[] | null | 6.5 | null | null |
|
GHSA-g2ch-vrrq-vf7w
|
A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). The result synchronization server of the affected products contains a
vulnerability that may lead to a denial of service condition. An attacker may
cause a denial of service situation of all socket-based communication of the
affected products if the result server is enabled.
|
[] | null | 8.6 | null | null |
|
CVE-2017-8856
|
In Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier, there is unauthenticated, arbitrary remote command execution using the 'bprd' process.
|
[
"cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-cvxv-g5fg-rfwf
|
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in phpWebFileManager 0.5 allows remote attackers to execute arbitrary PHP code via a URL in the PN_PathPrefix parameter. NOTE: this issue is disputed by a reliable third party, who demonstrates that PN_PathPrefix is defined before use.
|
[] | null | null | null | null |
|
CVE-2023-36631
|
Lack of access control in wfc.exe in Malwarebytes Binisoft Windows Firewall Control 6.9.2.0 allows local unprivileged users to bypass Windows Firewall restrictions via the user interface's rules tab. NOTE: the vendor's perspective is "this is intended behavior as the application can be locked using a password."
|
[
"cpe:2.3:a:malwarebytes:binisoft_windows_firewall_control:6.9.2.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-g527-324c-34j6
|
The LDAP component in CommuniGate Pro Core Server 5.0.7 allows remote attackers to cause a denial of service (application crash) via LDAP messages that contain Distinguished Names (DN) fields with a large number of elements.
|
[] | null | null | null | null |
|
GHSA-m8w6-9c44-28r8
|
Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.
|
[] | null | null | 6.5 | null |
|
CVE-2020-4025
|
The attachment download resource in Atlassian Jira Server and Data Center The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a rdf content type.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2007-1776
|
SQL injection vulnerability in index.php in the DesignForJoomla.com D4J eZine (com_ezine) 2.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the article parameter in a read action.
|
[
"cpe:2.3:a:design_for_joomla:d4j_ezine:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2019:0380
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.6 security update
|
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 5.3 | null |
CVE-2013-1527
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote authenticated users to affect confidentiality via unknown vectors related to Report Distribution.
|
[
"cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-j96m-6rcp-2p9r
|
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read.
|
[] | null | null | null | null |
|
CVE-2021-31862
|
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
|
[
"cpe:2.3:a:sysaid:sysaid:20.4.74:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2021-45934
|
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_HandlePacket and MqttClient_WaitType).
|
[
"cpe:2.3:a:wolfssl:wolfmqtt:1.9:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2023-33651
|
An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.
|
[
"cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-3jqw-5j52-c5fj
|
Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.
|
[] | null | null | null | null |
|
GHSA-327p-65jj-8ccq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2.
|
[] | null | 7.1 | null | null |
|
CVE-2017-10810
|
Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2018-12915
|
In libpbc.a in PBC through 2017-03-02, there is a buffer over-read in calc_hash in map.c.
|
[
"cpe:2.3:a:pbc_project:pbc:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
RHSA-2013:0250
|
Red Hat Security Advisory: elinks security update
|
elinks: Improper delegation of client credentials during GSS negotiation
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2018-8596
|
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8595.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-43290
|
WordPress Atarim plugin <= 4.0.1 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Atarim allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Atarim: from n/a through 4.0.1.
|
[
"cpe:2.3:a:atarim:atarim:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2025-5154
|
PhonePe App SQLite Database databases cleartext storage in a file or on disk
|
A vulnerability, which was classified as problematic, was found in PhonePe App 25.03.21.0 on Android. Affected is an unknown function of the file /data/data/com.phonepe.app/databases/ of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
|
[] | 4.6 | 2.3 | 2.3 | 1.4 |
CVE-2011-0515
|
KisKrnl.sys 2011.1.13.89 and earlier in Kingsoft AntiVirus 2011 SP5.2 allows local users to cause a denial of service (crash) via a crafted request that is not properly handled by the KiFastCallEntry hook.
|
[
"cpe:2.3:a:kingsoft:kingsoft_antivirus:2010.04.26.648:*:*:*:*:*:*:*",
"cpe:2.3:a:kingsoftsecurity:kingsoft_antivirus:2011:sp5.2:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-q2w3-vxgc-67jq
|
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
|
[] | null | 9.8 | null | null |
|
GHSA-xcc3-mxq7-rg5h
|
The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.
|
[] | null | null | null | null |
|
CVE-2015-1961
|
The REST API in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0 allows remote authenticated users to bypass intended access restrictions and execute arbitrary JavaScript code on the server via an unspecified API call.
|
[
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:standard:*:*:*"
] | null | null | null | 9 |
|
GHSA-xxcf-3q8h-4gjx
|
In ufdt_local_fixup_prop of ufdt_overlay.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254929746
|
[] | null | 4.4 | null | null |
|
GHSA-5mvg-7mqq-mfx7
|
Multiple stack-based buffer overflows in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allow remote attackers to execute arbitrary code via vectors involving the (1) AGI_SendToLog (aka _SendToLog) function; the (2) group, (3) workgroup, or (4) domain name field to the USER_S_AddADGroup function; the (5) user_path variable to the FXCLI_checkIndexDBLocation function; or (6) the _AGI_S_ActivateLTScriptReply (aka ActivateLTScriptReply) function. NOTE: this might overlap CVE-2010-3059.
|
[] | null | null | null | null |
|
CVE-2020-19719
|
A buffer overflow vulnerability in Ap4ElstAtom.cpp of Bento 1.5.1-628 leads to a denial of service (DOS).
|
[
"cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-5qc4-6xfv-f8r8
|
Rejected reason: Not used
|
[] | null | null | null | null |
|
RHSA-2011:1155
|
Red Hat Security Advisory: xorg-x11 security update
|
BSD compress LZW decoder buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
ICSA-21-252-03
|
Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU
|
The affected product allows an attacker to execute arbitrary commands due to the passing of unsafe user supplied data to the system shell.CVE-2019-14931 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). It is possible to download the affected product 's configuration file, which contains sensitive data, through the URL.CVE-2019-14927 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The affected product 's web configuration software allows an authenticated user to inject malicious data into the application that can then be executed in a victim 's browser, allowing stored cross-site scripting.CVE-2019-14928 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). Hard-coded SSH keys have been identified in the affected product 's firmware. As the secure keys cannot be regenerated by a user and are not regenerated on firmware updates, all deployed affected products utilize the same SSH keys.CVE-2019-14926 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected products contain undocumented user accounts with hard-coded password credentials. An attacker could exploit this vulnerability by using the accounts to login to affected RTU 's.CVE-2019-14930 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected products store password credentials in plain text in a configuration file. An unauthenticated user can obtain the exposed password credentials to gain access to the specific services.CVE-2019-14929 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected products store and reads configuration settings from a file that has insecure world-readable permissions assigned. This could allow all users on the system to read the configuration file containing usernames and plain text password combinations, as well as other sensitive configuration information of the RTU.CVE-2019-14925 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 6.5 | null |
GHSA-q66v-pchp-x9r8
|
Disk Images in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted UDIF image.
|
[] | null | null | null | null |
|
GHSA-jphr-rfwm-72w3
|
SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before 2015-08-11 is missing a size check when reading authBlob data into a buffer, which allows one to execute code on the remote target machine when sending a steam authentication request. This affects Call of Duty: Modern Warfare 2, Call of Duty: Modern Warfare 3, Call of Duty: Ghosts, Call of Duty: Advanced Warfare, Call of Duty: Black Ops 1, and Call of Duty: Black Ops 2.
|
[] | null | null | 9.8 | null |
|
CVE-2025-32587
|
WordPress WooCommerce Pickupp Plugin <= 2.4.0 - Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pickupp WooCommerce Pickupp allows PHP Local File Inclusion. This issue affects WooCommerce Pickupp: from n/a through 2.4.0.
|
[] | null | 8.1 | null | null |
CVE-2025-43569
|
Substance3D - Stager | Out-of-bounds Write (CWE-787)
|
Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
GHSA-v9r2-vfw5-q6j9
|
A vulnerability has been identified in SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
|
[] | 7 | 6.3 | null | null |
|
GHSA-rrj9-g495-q8w7
|
Improper check vulnerability in Samsung Health prior to version 6.17 allows attacker to read internal cache data via exported component.
|
[] | null | null | null | null |
|
GHSA-jvwm-5xhx-5mqp
|
Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by negative object number in indirect reference in the input PDF file.
|
[] | null | 2.9 | null | null |
|
GHSA-73v2-jpg5-227f
|
Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors.
|
[] | null | null | null | null |
|
ICSA-24-107-01
|
Measuresoft ScadaPro
|
The entire parent directory - C:\ScadaPro and its sub-directories and files are configured by default to allow user, including unprivileged users, to write or overwrite files.
|
[] | null | 5.5 | null | null |
CVE-2008-6956
|
Static code injection vulnerability in admin/admin.php in mxCamArchive 2.2 allows remote authenticated administrators to inject arbitrary PHP code into an unspecified program via the description parameter, which is executed by invocation of index.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:infireal:mxcamarchive:2.2:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2017-0666
|
A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37285689.
|
[
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-4733-qr3p-g2fh
|
Out-of-bounds Write in BuildOemEmbmsGetSigStrengthResponse of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.
|
[] | null | 6.7 | null | null |
|
GHSA-8cm2-f4g9-wjfm
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.
|
[] | null | 9.8 | null | null |
|
GHSA-h93j-jrrw-xqfp
|
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
|
[] | null | null | null | null |
|
GHSA-6594-47rj-5vcw
|
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
|
[] | null | null | null | null |
|
GHSA-rq5f-wjpw-45r3
|
Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null |
|
CVE-2025-32557
|
WordPress WP Featured Screenshot Plugin <= 1.3 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rico Macchi WP Featured Screenshot allows Reflected XSS. This issue affects WP Featured Screenshot: from n/a through 1.3.
|
[] | null | 7.1 | null | null |
CVE-2022-0457
|
Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.