id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wpv6-vrq2-rpfx
|
A vulnerability was found in Campcodes Student Information System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Users.php?f=save. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250602 is the identifier assigned to this vulnerability.
|
[] | null | 6.3 | null | null |
|
GHSA-rf57-p454-qrmj
|
APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Restriction of Operations within the Bounds of a Memory Buffer by local. Successful exploitation of this vulnerability may lead to privilege escalation and potentially arbitrary code execution, and impact Integrity.
|
[] | 4.4 | 4.8 | null | null |
|
CVE-2021-27956
|
Zoho ManageEngine ADSelfService Plus before 6104 allows stored XSS on the /webclient/index.html#/directory-search user search page via the e-mail address field.
|
[
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6103:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-86gv-xpwv-jprc
|
Malicious Package in diamond-clien
|
All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
[] | null | 9.8 | null | null |
GHSA-pp5r-cwfq-7whf
|
A stack buffer overflow vulnerability has been reported to affect QNAP device running QTS, QuTScloud, QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QTS, QuTScloud, QuTS hero: QTS 4.5.4.1715 build 20210630 and later QTS 5.0.0.1716 build 20210701 and later QTS 4.3.3.1693 build 20210624 and later QTS 4.3.6.1750 build 20210730 and later QuTScloud c4.5.6.1755 and later QuTS hero h4.5.4.1771 build 20210825 and later
|
[] | null | null | null | null |
|
CVE-2019-15316
|
Valve Steam Client for Windows through 2019-08-20 has weak folder permissions, leading to privilege escalation (to NT AUTHORITY\SYSTEM) via crafted use of CreateMountPoint.exe and SetOpLock.exe to leverage a TOCTOU race condition.
|
[
"cpe:2.3:a:valvesoftware:steam_client:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-fxpf-jghx-j26q
|
Certain NETGEAR devices are affected by denial of service. This affects R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64.
|
[] | null | null | null | null |
|
CVE-2022-20866
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability
|
A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key. The following conditions may be observed on an affected device: This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key. The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise section for more information on the detection of this type of RSA key. The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic.
|
[
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
CVE-2008-7312
|
The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address.
|
[
"cpe:2.3:a:websense:enterprise:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-18190
|
An issue was discovered in GoPro gpmf-parser before 1.2.1. There is a divide-by-zero error in GPMF_ScaledData in GPMF_parser.c.
|
[
"cpe:2.3:a:gopro:gpmf-parser:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-9rrr-65q4-qrrq
|
A privilege escalation vulnerability was discovered when Single Sign On (SSO) is enabled that could allow an attacker to intercept a valid, authenticated LXCA user’s XCC session if they can convince the user to click on a specially crafted URL.
|
[] | null | 6.8 | null | null |
|
CVE-2013-5806
|
Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
|
[
"cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2007-1583
|
The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
|
[
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-w784-3vvf-4384
|
The JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard.
|
[] | null | null | null | null |
|
CVE-2015-0534
|
EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.8 and 4.1.x before 4.1.3, RSA BSAFE Crypto-J before 6.2, RSA BSAFE SSL-J before 6.2, and RSA BSAFE SSL-C 2.8.9 and earlier do not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, a similar issue to CVE-2014-8275.
|
[
"cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-c:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-q7mj-q3mg-mfqp
|
Race condition in LoginWindow in Apple OS X before 10.10 allows physically proximate attackers to obtain access by leveraging an unattended workstation on which screen locking had been attempted.
|
[] | null | null | null | null |
|
GHSA-g8h6-3qp4-fcgg
|
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.This issue affects Popup Anything: from n/a through 2.8.
|
[] | null | 5.3 | null | null |
|
CVE-2023-46470
|
Cross Site Scripting vulnerability in Space Applications Services Yamcs v.5.8.6 allows a remote attacker to execute arbitrary code via crafted telecommand in the timeline view of the ArchiveBrowser.
|
[
"cpe:2.3:a:spaceapplications:yacms:5.8.6:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-98xp-9f82-g4xx
|
Kofax Power PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22045.
|
[] | null | null | 7.8 | null |
|
CVE-2012-2151
|
Multiple cross-site scripting (XSS) vulnerabilities in SPIP 1.9.x before 1.9.2.o, 2.0.x before 2.0.18, and 2.1.x before 2.1.13 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:spip:spip:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2010-4094
|
The Tomcat server in IBM Rational Quality Manager and Rational Test Lab Manager has a default password for the ADMIN account, which makes it easier for remote attackers to execute arbitrary code by leveraging access to the manager role. NOTE: this might overlap CVE-2009-3548.
|
[
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_test_lab_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7qfc-6cw5-2ppm
|
MultiSigWallet 0xF0C99 was discovered to contain a reentrancy vulnerability via the function executeTransaction.
|
[] | null | 7.5 | null | null |
|
CVE-2018-14828
|
Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-jfxv-gvx2-v4px
|
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to modify protected parts of the file system.
|
[] | null | 5.5 | null | null |
|
GHSA-2q8x-2p7f-574v
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
ImpactThe vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.PatchesXStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.WorkaroundsSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html).CreditsCeclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
[] | null | 8.5 | null | null |
GHSA-mqmc-8rqc-3vq8
|
Multiple SQL injection vulnerabilities in VBZooM 1.02 allow remote attackers to execute arbitrary SQL commands via the (1) QuranID, (2) ShowByQuranID, or (3) Action parameters to meaning.php.
|
[] | null | null | null | null |
|
GHSA-mq5p-2mcr-m52j
|
Code injection in nbgitpuller
|
ImpactDue to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment.Patches0.10.2WorkaroundsNone, other than upgrade to 0.10.2 or downgrade to 0.8.x.For more informationIf you have any questions or comments about this advisory:Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues)Email our security team at [security@ipython.org](mailto:security@ipython.org)
|
[] | 8.7 | 8.8 | null | null |
GHSA-2qhc-fjv7-8f36
|
A SQL injection vulnerability in license_update.php in Mumara Classic through 2.93 allows a remote unauthenticated attacker to execute arbitrary SQL commands via the license parameter.
|
[] | null | 9.8 | null | null |
|
GHSA-xjx4-wjjq-fmwp
|
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 5.4 | null | null |
|
GHSA-6c6x-jpwg-9w57
|
vtiger CRM 5.4.0 and earlier contain an Authentication Bypass Vulnerability due to improper authentication validation in the validateSession function.
|
[] | null | null | null | null |
|
CVE-2008-1694
|
vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[
"cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:sccs:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2018-13724
|
The mint function of a smart contract implementation for HYIPCrowdsale1, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:hyipcrowdsale1_project:hyipcrowdsale1:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-mm25-jv7r-42qf
|
Sercomm Model Etisalat Model S3- AC2100 is affected by Cross Site Scripting (XSS) via the firmware update page.
|
[] | null | 5.4 | null | null |
|
CVE-2025-26847
|
An issue was discovered in Znuny before 7.1.5. When generating a support bundle, not all passwords are masked.
|
[] | null | 9.1 | null | null |
|
CVE-2024-6569
|
Campaign Monitor for WordPress <= 2.8.15 - Unauthenticated Full Path Disclosure
|
The Campaign Monitor for WordPress plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.8.15. This is due the plugin not properly restricting direct access to /forms/views/admin/create.php and display_errors being enabled. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
|
[
"cpe:2.3:a:campaignmonitor:campaign_monitor:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
CVE-2022-48323
|
Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.
|
[
"cpe:2.3:a:sunlogin:sunflower:1.0.1.43315:*:*:*:simple:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-49cv-7gj5-qq34
|
Buffer overflow can occur due to improper validation of NDP application information length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
|
[] | null | null | null | null |
|
CVE-2021-37060
|
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2020-10620
|
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely.
|
[
"cpe:2.3:a:opto22:softpac_project:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2025-44896
|
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the bindEditMACName parameter in the web_acl_bindEdit_post function.
|
[] | null | 9.8 | null | null |
|
GHSA-3ffw-g5rc-2f2v
|
The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.
|
[] | null | null | null | null |
|
CVE-2025-30617
|
WordPress Rewrite - <= <= 0.2.1 Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in takien Rewrite allows Cross Site Request Forgery. This issue affects Rewrite: from n/a through 0.2.1.
|
[] | null | 4.3 | null | null |
CVE-2020-21684
|
A global buffer overflow in the put_font in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.
|
[
"cpe:2.3:a:fig2dev_project:fig2dev:3.2.7b:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2016-2428
|
libAACdec/src/aacdec_drc.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not properly limit the number of threads, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted media file, aka internal bug 26751339.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2007-0005
|
Multiple buffer overflows in the (1) read and (2) write handlers in the Omnikey CardMan 4040 driver in the Linux kernel before 2.6.21-rc3 allow local users to gain privileges.
|
[
"cpe:2.3:o:linux:linux_kernel:*:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:omnikey.aaitg:omnikey_cardman_4040:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-hwcj-q6q8-r3j3
|
ViewVC before 1.1.11 allows remote attackers to bypass the cvsdb row_limit configuration setting, and consequently conduct resource-consumption attacks, via the limit parameter, as demonstrated by a "query revision history" request.
|
[] | null | null | null | null |
|
GHSA-wj4m-jprf-g224
|
Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote attackers to execute arbitrary code.
|
[] | null | null | null | null |
|
CVE-2021-32508
|
QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following via FileStreaming function
|
Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
|
[
"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2024-45587
|
Unauthorized Modification Vulnerability
|
This vulnerability exists in Symphony XTS Web Trading platform version 2.0.0.1_P160 due to improper access controls on APIs in the Transaction module of vulnerable application. An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to compromise of other user accounts.
|
[
"cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1_p160:*:*:*:*:*:*:*",
"cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*",
"cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*"
] | 9.1 | null | null | null |
GHSA-7c52-4c49-68xc
|
An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.
|
[] | null | null | null | null |
|
GHSA-hvwc-2mrx-9ggw
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Perfmatters allows Stored XSS.This issue affects Perfmatters: from n/a before 2.2.0.
|
[] | null | 6.5 | null | null |
|
GHSA-3p9v-2c3q-cf4v
|
A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter.
|
[] | null | 9.8 | null | null |
|
CVE-2021-37456
|
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the blacklist IP address (stored).
|
[
"cpe:2.3:a:nchsoftware:axon_pbx:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2016-1617
|
The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
CVE-2019-10808
|
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
|
[
"cpe:2.3:a:xcritical.software:utilitify:*:*:*:*:*:node.js:*:*"
] | null | 8.8 | null | 6.5 |
|
ICSA-23-180-03
|
Ovarro TBox RTUs
|
The affected TBox RTUs are missing authorization for running some API commands. An attacker running these commands could reveal sensitive information such as software versions and web server file contents. The affected TBox RTUs store hashed passwords using MD5 encryption, which is an insecure encryption algorithm. The affected TBox RTUs run OpenVPN with root privileges and can run user defined configuration scripts. An attacker could set up a local OpenVPN server and push a malicious script onto the TBox host to acquire root privileges. The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves. The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with "user" privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens. All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
|
[] | null | null | 6.5 | null |
CVE-2023-21288
|
In visitUris of Notification.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-5c8g-9448-5x46
|
The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when resetting plugin settings via the yrc_nuke GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to delete YouTube channels from the plugin.
|
[] | null | 6.5 | null | null |
|
GHSA-5987-rf7v-24fh
|
Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality via unknown vectors related to Utility/fdformat.
|
[] | null | null | null | null |
|
CVE-2013-4856
|
D-Link DIR-865L has Information Disclosure.
|
[
"cpe:2.3:o:dlink:dir-865l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.9 |
|
CVE-2022-40828
|
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
|
[
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc3:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-ppw5-9xh7-rwjf
|
The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
|
[] | null | null | null | null |
|
GHSA-vg7m-gf8v-2vhp
|
WebReports in IBM BigFix Platform (formerly Tivoli Endpoint Manager) 9.x before 9.5.2 allows remote attackers to obtain sensitive information by sniffing the network for HTTP traffic.
|
[] | null | null | 5.9 | null |
|
GHSA-p8pr-5qmg-85fr
|
A cross-site request forgery (CSRF) vulnerability in the pjActionUpdate function of PHPJabbers Cinema Booking System v2.0 allows remote attackers to escalate privileges by tricking an authenticated admin into submitting an unauthorized request.
|
[] | null | 5.4 | null | null |
|
CVE-2025-51480
|
Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions.
|
[] | null | 8.8 | null | null |
|
GHSA-35g7-p3m9-m7r9
|
A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function _Load_Users of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The name of the patch is dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account
|
[] | null | 7.2 | null | null |
|
CVE-2025-52832
|
WordPress NGG Smart Image Search <= 3.4.1 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpo-HR NGG Smart Image Search allows SQL Injection. This issue affects NGG Smart Image Search: from n/a through 3.4.1.
|
[] | null | 9.3 | null | null |
GHSA-q7mw-49rv-w8qw
|
The Asus ZenFone 3 Ultra Android device with a build fingerprint of asus/WW_Phone/ASUS_A001:7.0/NRD90M/14.1010.1804.75-20180612:user/release-keys contains a pre-installed app with a package name of com.asus.splendidcommandagent app (versionCode=1510200105, versionName=1.2.0.21_180605) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
|
[] | null | null | null | null |
|
CVE-2024-31636
|
An issue in LIEF v.0.14.1 allows a local attacker to obtain sensitive information via the name parameter of the machd_reader.c component.
|
[
"cpe:2.3:a:lief-project:lief:-:*:*:*:*:*:*:*"
] | null | 3.9 | null | null |
|
GHSA-x5gf-jr5f-x67g
|
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
|
[] | null | null | null | null |
|
RHSA-2021:1343
|
Red Hat Security Advisory: Ansible security update (2.9.20)
|
ansible: multiple modules expose secured values
|
[
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 5 | null | null |
CVE-2024-22523
|
Directory Traversal vulnerability in Qiyu iFair version 23.8_ad0 and before, allows remote attackers to obtain sensitive information via uploadimage component.
|
[
"cpe:2.3:a:fuwushe:ifair:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
PYSEC-2017-45
| null |
Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path.
|
[] | null | null | null | null |
CVE-2002-0094
|
config_converters.py in BSCW (Basic Support for Cooperative Work) 3.x and versions before 4.06 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name during filename conversion.
|
[
"cpe:2.3:a:fraunhofer_fit:bscw:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fraunhofer_fit:bscw:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-3701
|
Use after free issue while processing error notification from camx driver due to not properly releasing the sequence data in Snapdragon Mobile in Saipan, SM8250, SXR2130
|
[
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-v3cp-jj5w-cffv
|
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020).
|
[] | null | null | null | null |
|
CVE-2014-0227
|
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
|
[
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2025-30117
|
An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Managing Settings and Obtaining Sensitive Data and Sabotaging the Car Battery can be performed by unauthorized parties. After bypassing the device pairing, an attacker can obtain sensitive user and vehicle information through the settings interface. Remote attackers can modify power management settings, disable recording, delete stored footage, and turn off battery protection, leading to potential denial-of-service conditions and vehicle battery drainage.
|
[] | null | 7.3 | null | null |
|
GHSA-9qwx-qvm3-h6gg
|
Missing Authorization vulnerability in Analytify.This issue affects Analytify: from n/a through 4.2.3.
|
[] | null | 6.5 | null | null |
|
CVE-2021-4435
|
Yarn: untrusted search path
|
An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways.
|
[
"cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
CVE-2021-24322
|
Database Backup for WordPress < 2.4 - Authenticated Persistent Cross-Site Scripting (XSS)
|
The Database Backup for WordPress plugin before 2.4 did not escape the backup_recipient POST parameter in before output it back in the attribute of an HTML tag, leading to a Stored Cross-Site Scripting issue.
|
[
"cpe:2.3:a:deliciousbrains:database_backup:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
CVE-2011-5236
|
Moneris eSelectPlus 2.03 PHP API does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[
"cpe:2.3:a:moneris:eselect_plus:2.03:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2007-1370
|
Zend Platform 2.2.3 and earlier has incorrect ownership for scd.sh and certain other files, which allows local users to gain root privileges by modifying the files. NOTE: this only occurs when safe_mode and open_basedir are disabled; other settings require leverage for other vulnerabilities.
|
[
"cpe:2.3:a:zend:zend_platform:2.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_platform:2.2.1a:a:*:*:*:*:*:*"
] | null | null | null | 6.2 |
|
GHSA-vvxm-2vxq-rhgq
|
Improper Restriction of Excessive Authentication Attempts vulnerability in Yordam Information Technology Yordam Library Automation System allows Interface Manipulation.This issue affects Yordam Library Automation System: before 20.1.
|
[] | 6.9 | 6.5 | null | null |
|
GHSA-h3f2-h685-8j5j
|
JGS-XA JGS-Portal 3.0.2 and earlier allows remote attackers to obtain the full server path via direct requests to (1) jgs_portal_ref.php, (2) jgs_portal_land.php, (3) jgs_portal_log.php, (4) jgs_portal_global_sponsor.php, (5) jgs_portal_global.php, (6) jgs_portal_system.php, (7) jgs_portal_views.php; or multiple files in the jgs_portal_include directory, including (8) jgs_portal_boardmenue.php, (9) jgs_portal_forenliste.php, (10) jgs_portal_geburtstag.php, (11) jgs_portal_guckloch.php, (12) jgs_portal_kalender.php, (13) jgs_portal_letztethemen.php, (14) jgs_portal_links.php, (15) jgs_portal_neustemember.php, (16) jgs_portal_newsboard.php, (17) jgs_portal_online.php, (18) jgs_portal_pn.php, (19) jgs_portal_portalmenue.php, (20) jgs_portal_styles.php, (21) jgs_portal_suchen.php, (22) jgs_portal_team.php, (23) jgs_portal_topforen.php, (24) jgs_portal_topposter.php, (25) jgs_portal_umfrage.php, (26) jgs_portal_useravatar.php, (27) jgs_portal_waronline.php, (28) jgs_portal_woonline.php, or (29) jgs_portal_zufallsavatar.php.
|
[] | null | null | null | null |
|
GHSA-2xq4-823c-q5v9
|
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
|
[] | null | 5.7 | null | null |
|
CVE-2024-1158
|
The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the buddyforms_new_page function in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber access or higher, to create pages with arbitrary titles. These pages are published.
|
[] | null | 4.3 | null | null |
|
GHSA-5cpr-8f75-c2g3
|
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
|
[] | null | null | null | null |
|
CVE-2025-4254
|
PCMan FTP Server LIST Command buffer overflow
|
A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component LIST Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2020-27302
|
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
|
[
"cpe:2.3:o:realtek:rtl8710c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8710c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtl8195a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8195a:-:*:*:*:*:*:*:*"
] | null | 8 | null | 7.7 |
|
CVE-2023-21875
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-cvq3-wg24-45v2
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Nirvana allows Stored XSS.This issue affects Nirvana: from n/a through 1.6.3.
|
[] | null | 6.5 | null | null |
|
GHSA-c397-p6xh-cjxg
|
Cross-Site Request Forgery (CSRF) vulnerability in ThemeMove QuickCal allows Privilege Escalation. This issue affects QuickCal: from n/a through 1.0.13.
|
[] | null | 8.8 | null | null |
|
CVE-2007-4263
|
Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors.
|
[
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
RHSA-2024:10750
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
CVE-2024-27966
|
WordPress Quiz And Survey Master plugin <= 8.2.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExpressTech Quiz And Survey Master allows Stored XSS.This issue affects Quiz And Survey Master: from n/a through 8.2.2.
|
[] | null | 5.9 | null | null |
GHSA-44m7-95qr-8rxg
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 5.4 | null | null |
|
CVE-2020-8122
|
A missing check in Nextcloud Server 14.0.3 could give recipient the possibility to extend the expiration date of a share they received.
|
[
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-4cgh-427p-hh6m
|
In the Linux kernel, the following vulnerability has been resolved:net/ipv6: release expired exception dst cached in socketDst objects get leaked in ip6_negative_advice() when this function is
executed for an expired IPv6 route located in the exception table. There
are several conditions that must be fulfilled for the leak to occur:an ICMPv6 packet indicating a change of the MTU for the path is received,
resulting in an exception dst being createda TCP connection that uses the exception dst for routing packets must
start timing out so that TCP begins retransmissionsafter the exception dst expires, the FIB6 garbage collector must not run
before TCP executes ip6_negative_advice() for the expired exception dstWhen TCP executes ip6_negative_advice() for an exception dst that has
expired and if no other socket holds a reference to the exception dst, the
refcount of the exception dst is 2, which corresponds to the increment
made by dst_init() and the increment made by the TCP socket for which the
connection is timing out. The refcount made by the socket is never
released. The refcount of the dst is decremented in sk_dst_reset() but
that decrement is counteracted by a dst_hold() intentionally placed just
before the sk_dst_reset() in ip6_negative_advice(). After
ip6_negative_advice() has finished, there is no other object tied to the
dst. The socket lost its reference stored in sk_dst_cache and the dst is
no longer in the exception table. The exception dst becomes a leaked
object.As a result of this dst leak, an unbalanced refcount is reported for the
loopback device of a net namespace being destroyed under kernels that do
not contain e5f80fcf869a ("ipv6: give an IPv6 dev to blackhole_netdev"):
unregister_netdevice: waiting for lo to become free. Usage count = 2Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). The
patch that introduced the dst_hold() in ip6_negative_advice() was
92f1655aa2b22 ("net: fix __dst_negative_advice() race"). But 92f1655aa2b22
merely refactored the code with regards to the dst refcount so the issue
was present even before 92f1655aa2b22. The bug was introduced in
54c1a859efd9f ("ipv6: Don't drop cache route entry unless timer actually
expired.") where the expired cached route is deleted and the sk_dst_cache
member of the socket is set to NULL by calling dst_negative_advice() but
the refcount belonging to the socket is left unbalanced.The IPv4 version - ipv4_negative_advice() - is not affected by this bug.
When the TCP connection times out ipv4_negative_advice() merely resets the
sk_dst_cache of the socket while decrementing the refcount of the
exception dst.
|
[] | null | null | null | null |
|
PYSEC-2012-15
| null |
Paste Script 1.7.5 and earlier does not properly set group memberships during execution with root privileges, which might allow remote attackers to bypass intended file-access restrictions by leveraging a web application that uses the local filesystem.
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.