id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2018:2712
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
8.4
null
CVE-2000-0615
LPRng 3.6.x improperly installs lpd as setuid root, which can allow local users to append lpd trace and logging messages to files.
[ "cpe:2.3:o:astart_technologies:lprng:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:astart_technologies:lprng:3.6.15:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2003:166
Red Hat Security Advisory: : : : Updated MySQL packages fix vulnerabilities
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
GHSA-frxp-ch88-g8fc
Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.
[]
null
7.8
null
null
GHSA-j3hv-8587-44rm
Oracle Database Server 10.1, 10.2, and 11g grants directory WRITE permissions for arbitrary pathnames that are aliased in a CREATE OR REPLACE DIRECTORY statement, which allows remote authenticated users with CREATE ANY DIRECTORY privileges to gain SYSDBA privileges by aliasing the pathname of the password directory, and then overwriting the password file through UTL_FILE operations, a related issue to CVE-2006-7141.
[]
null
null
null
null
GHSA-rf5h-29fq-hr47
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the email_attach_id parameter at /LHMail/AttachDown.aspx.
[]
null
9.4
null
null
CVE-2022-23831
Insufficient validation of the IOCTL input buffer in AMD μProf may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service.
[ "cpe:2.3:a:amd:amd_uprof:*:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2021-39750
In PackageManager, there is a possible way to change the splash screen theme of other apps due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-206474016
[ "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-572v-pm5r-97rp
Some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) were affected by a buffer overflow vulnerability in the arg4 and arg9 parameters of several functionalities of the web application that would allow an authenticated attacker to perform a Denial of Service attack, crashing the device, or potentially execute arbitrary code on the device.
[]
null
null
null
null
CVE-2019-16510
libIEC61850 through 1.3.3 has a use-after-free in MmsServer_waitReady in mms/iso_mms/server/mms_server.c, as demonstrated by server_example_goose.
[ "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2012-4035
The new_password page in PBBoard 2.1.4 allows remote attackers to change the password of arbitrary user accounts via the member_id and new_password parameters to index.php.
[ "cpe:2.3:a:pbboard:pbboard:2.1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-327w-jr39-3fwh
server/pm/UserManagerService.java in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to bypass intended restrictions on Wi-Fi configuration changes by leveraging guest access, aka internal bug 27411179.
[]
null
null
5.5
null
GHSA-vvj2-hwcp-w2c5
This candidate was in a CNA pool that was not assigned to any issues during 2022.
[]
null
null
null
null
GHSA-3m8g-vw47-p2rp
Integer overflow in the FORMATS Plugin before 4.23 for IrfanView allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large XPM file that triggers a heap-based buffer overflow.
[]
null
null
null
null
GHSA-jqrg-p48v-g4w4
Cross-site scripting (XSS) vulnerability in webview.cpp in QtDemoBrowser allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a "universal XSS" issue, a similar vulnerability to CVE-2010-2536.
[]
null
null
null
null
GHSA-8r7w-qmfc-f4gc
Unspecified vulnerability in Mahara before 0.9.1 has unknown impact and remote attack vectors, probably related to cross-site scripting (XSS) in uploaded files.
[]
null
null
null
null
GHSA-xwhf-r489-w73v
An issue was discovered in TigerGraph Enterprise Free Edition 3.x. Data loading jobs in gsql_server, created by any user with designer permissions, can read sensitive data from arbitrary locations.
[]
null
6.5
null
null
CVE-2012-4687
Post Oak Bluetooth Traffic Systems Insufficient Entropy
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
[ "cpe:2.3:h:postoaktraffic:awam_bluetooth_reader:-:*:*:*:*:*:*:*" ]
null
null
null
7.6
CVE-2019-14291
An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 3.
[ "cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-p872-99gj-2vw3
ASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.
[]
null
8.8
null
null
GHSA-4qhc-v8r6-8vwm
HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
[]
null
7.5
null
null
CVE-2014-2422
Unspecified vulnerability in Oracle Java SE 7u51 and 8, and JavaFX 2.2.51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:javafx:2.2.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-h93q-5v68-w53c
Integer signedness error in FreeBSD 6.0-RELEASE allows local users to cause a denial of service (memory corruption and kernel panic) via a PT_LWPINFO ptrace command with a large negative data value that satisfies a signed maximum value check but is used in an unsigned copyout function call.
[]
null
null
null
null
CVE-2019-9921
An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to read information that should only be accessible by a different user.
[ "cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\\!:*:*" ]
null
null
7.7
null
CVE-2018-18016
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-28:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-m4pq-fv2w-6hrw
Deno's deno_runtime vulnerable to interactive permission prompt spoofing via improper ANSI stripping
SummaryA maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents.DetailsIn [the patch for CVE-2023-28446](https://github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286d), Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences.For example, requesting the read permission with `/tmp/hello\u001b[/../../etc/hosts` as a path will display the `/tmp/hellotc/hosts` in the permission prompt, but the actual permission given to the program is `/tmp/hello\u001b[/../../etc/hosts`, which is `/etc/hosts` after the normalization.This difference allows a malicious Deno program to spoof the contents of the permission prompt.PoCRun the following JavaScript and observe that `/tmp/hellotc/hosts` is displayed in the permission prompt instead of `/etc/hosts`, although Deno gives access to `/etc/hosts`.Expected promptActual promptImpactAny Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user.
[]
null
8.8
null
null
GHSA-9hr8-jgq4-7m7w
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the 'view' parameter in '/eventwinner/index.php'.
[]
null
7.1
null
null
CVE-2024-53309
A stack-based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when an overly long string is passed to the "-f" parameter. This can lead to memory corruption, potentially allowing arbitrary code execution or causing a denial of service via specially crafted input.
[]
null
5.5
null
null
CVE-2005-1556
Gamespy cd-key validation system allows remote attackers to cause a denial of service (cd-key already in use) by capturing and replaying a cd-key authorization session.
[ "cpe:2.3:a:gamespy:gamespy_sdk_cd-key_validation_toolkit:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-ffmr-8p66-95px
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
[]
null
null
5.5
null
CVE-2013-1231
The HTTP implementation in Cisco WebEx Node for MCS and WebEx Meetings Server allows remote attackers to read cache files via a crafted request, aka Bug IDs CSCue36664 and CSCue36629.
[ "cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_node_for_mcs:-:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2020-26249
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue.
[ "cpe:2.3:a:cogboard:red-dashboard:0.1.2:alpha0:*:*:*:*:*:*", "cpe:2.3:a:cogboard:red-dashboard:0.1.3:alpha0:*:*:*:*:*:*", "cpe:2.3:a:cogboard:red-dashboard:0.1.4:alpha0:*:*:*:*:*:*", "cpe:2.3:a:cogboard:red-dashboard:0.1.5:alpha0:*:*:*:*:*:*", "cpe:2.3:a:cogboard:red-dashboard:0.1.6:alpha0:*:*:*:*:*:*" ]
null
7.7
null
null
GHSA-mq45-cj46-gpg8
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password.
[]
null
null
null
null
CVE-2024-43580
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Microsoft Edge (Chromium-based) Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-wm63-7mw9-jg6q
Windows SMBv3 Client/Server Remote Code Execution Vulnerability.
[]
null
8.8
null
null
GHSA-g83h-xg2p-5qrr
The ThemeInstalledInfoBarDelegate::Observe function in browser/extensions/theme_installed_infobar_delegate.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle incorrect tab interaction by an extension, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted extension.
[]
null
null
null
null
CVE-2014-5988
The Azkend Gold (aka com.the10tons.azkend.gold) application 1.2.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:getjar:azkend_gold:1.2.6:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-6hh6-59j2-qrxw
Silverstripe History XSS Vulnerability
A cross-site scripting vulnerability has been discovered in the CMS page history tab.This vulnerability can only be exploited if a user with CMS access has posted malicious or unescaped HTML into any of the text fields on a page, and if the "compare mode" option is selected. The HTML will be embedded into the page unescaped.This has been resolved by performing the text comparison in a HTML friendly way.
[]
null
6.1
null
null
RHSA-2015:1439
Red Hat Security Advisory: wpa_supplicant security and enhancement update
hostapd: integer underflow in AP mode WMM Action frame processing
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2020-15131
False-positive validity for NFT1 genesis transactions in SLP Validate
In SLP Validate (npm package slp-validate) before version 1.2.2, there is a vulnerability to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. This is fixed in version 1.2.2.
[ "cpe:2.3:a:simpleledger:slp-validate:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-g9xq-w95r-h8gg
SQL injection vulnerability in iWebNegar allows remote attackers to execute arbitrary SQL commands via (1) the string parameter for index.php, (2) comments.php, or (3) the administrator login page.
[]
null
null
null
null
GHSA-jxx2-55mc-35gm
A vulnerability in the web-based interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections by the affected software. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could change the password of a targeted user. An attacker could then take unauthorized actions on behalf of the targeted user.
[]
null
null
null
null
CVE-2010-0522
Server Admin in Apple Mac OS X Server 10.5.8 does not properly determine the privileges of users who had former membership in the admin group, which allows remote authenticated users to leverage this former membership to obtain a server connection via screen sharing.
[ "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-pr99-9g59-4vj9
The Download Manager WordPress plugin before 3.2.55 does not validate one of its settings, which could allow high privilege users such as admin to list and read arbitrary files and folders outside of the blog directory
[]
null
4.9
null
null
GHSA-j4rv-c6x5-m7c5
In gpu_slc_get_region of pixel_gpu_slc.c, there is a possible EoP due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
8.1
null
null
CVE-2013-3685
A Privilege Escalation Vulnerability exists in Sprite Software Spritebud 1.3.24 and 1.3.28 and Backup 2.5.4105 and 2.5.4108 on LG Android smartphones due to a race condition in the spritebud daemon, which could let a local malicious user obtain root privileges.
[ "cpe:2.3:a:spritesoftware:spritebackup:2.5.4105:*:*:*:*:*:*:*", "cpe:2.3:a:spritesoftware:spritebackup:2.5.4108:*:*:*:*:*:*:*", "cpe:2.3:a:spritesoftware:spritebud:1.3.24:*:*:*:*:*:*:*", "cpe:2.3:a:spritesoftware:spritebud:1.3.28:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e971:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e973:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e975:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e975k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e975t:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e976:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:e977:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f100k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f100l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f100s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f120k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f120l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f120s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f160k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f160l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f160lv:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f160s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f180k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f180l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f180s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f200k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f200l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f200s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f240k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f240l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f240s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f260k:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:f260s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:l21_:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:lg870:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:ls860:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:ls970:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p760:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p769:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p780:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p875:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p875h:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p880:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:p940:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:su540:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:su870:-:*:*:*:*:*:*:*", "cpe:2.3:h:lg:us780:-:*:*:*:*:*:*:*" ]
null
7
null
6.9
CVE-2012-4927
SQL injection vulnerability in Limesurvey (a.k.a PHPSurveyor) before 1.91+ Build 120224 and earlier allows remote attackers to execute arbitrary SQL commands via the fieldnames parameter to index.php.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.49:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.49:rc2:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.49_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.80:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.80:rc4:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.80\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.81:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.81\\+:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-7801
A Code Injection vulnerability exists in EVLink Parking, v3.2.0-12_v1 and earlier, which could enable access with maximum privileges when a remote code execution is performed.
[ "cpe:2.3:o:schneider-electric:evlink_parking_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_parking:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-xmvf-7wg4-234h
The kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.
[]
null
null
null
null
CVE-2023-3009
Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[ "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2018-19167
CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
[ "cpe:2.3:a:cloakcoin:cloakcoin:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
RHSA-2025:8636
Red Hat Security Advisory: perl-FCGI security update
perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library
[ "cpe:/o:redhat:enterprise_linux:10.0" ]
null
7.5
null
null
GHSA-q2wc-95m2-mjxm
The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android) application before 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-x977-5q6f-7pg9
CVE-2019-8643: Arun Sharma of VMWare This issue is fixed in macOS Mojave 10.14. Description: A logic issue was addressed with improved state management..
[]
null
null
null
null
GHSA-rh6r-mvm2-jvgv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.7.0.
[]
null
7.1
null
null
GHSA-vwgw-5wg9-mw8j
The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
[]
null
null
null
null
CVE-2024-56547
rcu/nocb: Fix missed RCU barrier on deoffloading
In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix missed RCU barrier on deoffloading Currently, running rcutorture test with torture_type=rcu fwd_progress=8 n_barrier_cbs=8 nocbs_nthreads=8 nocbs_toggle=100 onoff_interval=60 test_boost=2, will trigger the following warning: WARNING: CPU: 19 PID: 100 at kernel/rcu/tree_nocb.h:1061 rcu_nocb_rdp_deoffload+0x292/0x2a0 RIP: 0010:rcu_nocb_rdp_deoffload+0x292/0x2a0 Call Trace: <TASK> ? __warn+0x7e/0x120 ? rcu_nocb_rdp_deoffload+0x292/0x2a0 ? report_bug+0x18e/0x1a0 ? handle_bug+0x3d/0x70 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? rcu_nocb_rdp_deoffload+0x292/0x2a0 rcu_nocb_cpu_deoffload+0x70/0xa0 rcu_nocb_toggle+0x136/0x1c0 ? __pfx_rcu_nocb_toggle+0x10/0x10 kthread+0xd1/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2f/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> CPU0 CPU2 CPU3 //rcu_nocb_toggle //nocb_cb_wait //rcutorture // deoffload CPU1 // process CPU1's rdp rcu_barrier() rcu_segcblist_entrain() rcu_segcblist_add_len(1); // len == 2 // enqueue barrier // callback to CPU1's // rdp->cblist rcu_do_batch() // invoke CPU1's rdp->cblist // callback rcu_barrier_callback() rcu_barrier() mutex_lock(&rcu_state.barrier_mutex); // still see len == 2 // enqueue barrier callback // to CPU1's rdp->cblist rcu_segcblist_entrain() rcu_segcblist_add_len(1); // len == 3 // decrement len rcu_segcblist_add_len(-2); kthread_parkme() // CPU1's rdp->cblist len == 1 // Warn because there is // still a pending barrier // trigger warning WARN_ON_ONCE(rcu_segcblist_n_cbs(&rdp->cblist)); cpus_read_unlock(); // wait CPU1 to comes online and // invoke barrier callback on // CPU1 rdp's->cblist wait_for_completion(&rcu_state.barrier_completion); // deoffload CPU4 cpus_read_lock() rcu_barrier() mutex_lock(&rcu_state.barrier_mutex); // block on barrier_mutex // wait rcu_barrier() on // CPU3 to unlock barrier_mutex // but CPU3 unlock barrier_mutex // need to wait CPU1 comes online // when CPU1 going online will block on cpus_write_lock The above scenario will not only trigger a WARN_ON_ONCE(), but also trigger a deadlock. Thanks to nocb locking, a second racing rcu_barrier() on an offline CPU will either observe the decremented callback counter down to 0 and spare the callback enqueue, or rcuo will observe the new callback and keep rdp->nocb_cb_sleep to false. Therefore check rdp->nocb_cb_sleep before parking to make sure no further rcu_barrier() is waiting on the rdp.
[]
null
null
null
null
GHSA-2qcc-4q33-8f32
Cross-Site Request Forgery (CSRF) vulnerability in WP EasyCart.This issue affects WP EasyCart: from n/a through 5.5.19.
[]
null
5.4
null
null
GHSA-f5hg-xwhp-3gj9
H3C Magic B1ST v100R012 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
[]
null
9.8
null
null
CVE-2024-6984
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm.
[ "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2023-52928
bpf: Skip invalid kfunc call in backtrack_insn
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip invalid kfunc call in backtrack_insn The verifier skips invalid kfunc call in check_kfunc_call(), which would be captured in fixup_kfunc_call() if such insn is not eliminated by dead code elimination. However, this can lead to the following warning in backtrack_insn(), also see [1]: ------------[ cut here ]------------ verifier backtracking bug WARNING: CPU: 6 PID: 8646 at kernel/bpf/verifier.c:2756 backtrack_insn kernel/bpf/verifier.c:2756 __mark_chain_precision kernel/bpf/verifier.c:3065 mark_chain_precision kernel/bpf/verifier.c:3165 adjust_reg_min_max_vals kernel/bpf/verifier.c:10715 check_alu_op kernel/bpf/verifier.c:10928 do_check kernel/bpf/verifier.c:13821 [inline] do_check_common kernel/bpf/verifier.c:16289 [...] So make backtracking conservative with this by returning ENOTSUPP. [1] https://lore.kernel.org/bpf/CACkBjsaXNceR8ZjkLG=dT3P=4A8SBsg0Z5h5PWLryF5=ghKq=g@mail.gmail.com/
[]
null
null
null
null
CVE-2021-28495
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train
[ "cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
PYSEC-2023-81
null
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176.
[]
null
null
null
null
CVE-2024-9354
Estatik Mortgage Calculator <= 2.0.11 - Reflected Cross-Site Scripting
The Estatik Mortgage Calculator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'color' parameter in all versions up to, and including, 2.0.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2023-52084
Winter CMS Stored XSS through Backend ColorPicker FormWidget
Winter is a free, open-source content management system. Prior to 1.2.4, Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be rendered unescaped in the backend form, potentially allowing for a stored XSS attack. This issue has been patched in v1.2.4.
[ "cpe:2.3:a:wintercms:winter:*:*:*:*:*:*:*:*" ]
null
2
null
null
GHSA-wrgm-p49w-3hh3
ASUSTek ZenBook Pro Due 15 UX582 laptop firmware through 203 has Insecure Permissions that allow attacks by a physically proximate attacker.
[]
null
null
null
null
CVE-2021-20637
Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/PR5B allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL.
[ "cpe:2.3:o:logitech:lan-w300n\\/pr5b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:logitech:lan-w300n\\/pr5b:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-xxcm-9w66-xprx
In IJG JPEG (aka libjpeg) before 9d, read_*_pixel() in rdtarga.c in cjpeg mishandles EOF.
[]
null
null
null
null
GHSA-5ccq-w6wj-jcqq
An issue was discovered in Rehau devices that use a pCOWeb card BIOS v6.27, BOOT v5.00, web version v2.2, allows attackers to gain full unauthenticated access to the configuration and service interface.
[]
null
7.5
null
null
CVE-2021-29836
IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.
[ "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*" ]
null
null
5.4
null
GHSA-hjwh-ffhj-2hxf
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.
[]
null
7.5
null
null
GHSA-73c7-5g37-cmq7
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
[]
null
null
7.2
null
CVE-2022-32960
HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
[ "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*", "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*", "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*" ]
null
6.8
null
null
CVE-2017-14648
A global buffer overflow was discovered in the iteration_loop function in loop.c in BladeEnc version 0.94.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution.
[ "cpe:2.3:a:bladeenc:bladeenc:0.94.2:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-4pv6-q257-8q33
An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4.8 through 6.4.10 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and the remote FortiGuard server hosting outbreakalert ressources.
[]
null
8.1
null
null
GHSA-jfvq-2j38-f4q8
Directory traversal vulnerability in SnapStream PVS 1.2a allows remote attackers to read arbitrary files via a .. (dot dot) attack in the requested URL.
[]
null
null
null
null
CVE-2018-0505
BotPasswords can bypass CentralAuth's account lock
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2021-43676
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php.
[ "cpe:2.3:a:swoole:swoole_php_framework:3.0.5:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-3w9m-7j3j-w9p6
Power BI Report Server Spoofing Vulnerability
[]
null
7.6
null
null
CVE-2025-7307
IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability
IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26388.
[]
null
null
7.8
null
CVE-2023-33250
The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c.
[ "cpe:2.3:o:linux:linux_kernel:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
CVE-2023-36136
PHPJabbers Class Scheduling System 1.0 lacks encryption on the password when editing a user account (update user page) allowing an attacker to capture all user names and passwords in clear text.
[ "cpe:2.3:a:phpjabbers:class_scheduling_system:1.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
RHSA-2013:1652
Red Hat Security Advisory: coreutils security, bug fix, and enhancement update
coreutils: segfault in "sort -d" and "sort -M" with long line input coreutils: segfault in uniq with long line input coreutils: segfault in "join -i" with long line input
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-6c52-p976-r7rq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in closed SOCIAL.NINJA allows Stored XSS. This issue affects SOCIAL.NINJA: from n/a through 0.2.
[]
null
6.5
null
null
GHSA-6fw2-8jqq-27x2
Format string vulnerability in Soldner Secret Wars 30830 and earlier allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in a message.
[]
null
null
null
null
CVE-2024-20715
Adobe Substance 3D Stager v2.1.1 Vulnerability VIII
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2023-41927
Weak TLS Cipher Suites Supported in Kiloview P1/P2 devices
The server supports at least one cipher suite which is on the NCSC-NL list of cipher suites to be phased out, increasing the risk of cryptographic weaknesses.
[]
null
5.3
null
null
CVE-2018-11799
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
[ "cpe:2.3:a:apache:oozie:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:oozie:3.1.3:incubating:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-j8p2-hh7r-9r58
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
[]
null
null
null
null
GHSA-5pww-x83q-7gjh
BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities.Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755.BSON-XS was the official Perl XS implementation of MongoDB's BSON serialization, but this distribution has reached its end of life as of August 13, 2020 and is no longer supported.
[]
null
9.8
null
null
CVE-2024-52025
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at geniepppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[ "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:1.0.4.128:*:*:*:*:*:*:*" ]
null
5.7
null
null
GHSA-8pqc-m8ff-xf67
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
[]
null
5.5
null
null
GHSA-2rpv-5gq5-8p5q
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."
[]
null
null
7.5
null
GHSA-rvj9-2hjw-96xg
Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536.
[]
null
null
null
null
GHSA-492c-rr88-qfhx
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
[]
null
8.8
null
null
GHSA-j5vp-xx87-j2xg
Apple Safari allows remote attackers to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.styleSheets[0].href property value.
[]
null
null
null
null
CVE-2020-4022
The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a mixed multipart content type.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2017-12988
The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
[ "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-52gj-mvxw-vcvp
Cisco Videoscape Distribution Suite Service Manager (VDS-SM) 3.4.0 and earlier does not always use RBAC for backend database access, which allows remote authenticated users to read or write to database entries via (1) the GUI or (2) a crafted HTTP request, aka Bug ID CSCuv87025.
[]
null
null
null
null
GHSA-8474-rc7c-wrhp
High severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish.The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
[]
null
null
null
null