id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2018:2712
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
|
[
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 8.4 | null |
CVE-2000-0615
|
LPRng 3.6.x improperly installs lpd as setuid root, which can allow local users to append lpd trace and logging messages to files.
|
[
"cpe:2.3:o:astart_technologies:lprng:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:astart_technologies:lprng:3.6.15:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
RHSA-2003:166
|
Red Hat Security Advisory: : : : Updated MySQL packages fix vulnerabilities
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
GHSA-frxp-ch88-g8fc
|
Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.
|
[] | null | 7.8 | null | null |
|
GHSA-j3hv-8587-44rm
|
Oracle Database Server 10.1, 10.2, and 11g grants directory WRITE permissions for arbitrary pathnames that are aliased in a CREATE OR REPLACE DIRECTORY statement, which allows remote authenticated users with CREATE ANY DIRECTORY privileges to gain SYSDBA privileges by aliasing the pathname of the password directory, and then overwriting the password file through UTL_FILE operations, a related issue to CVE-2006-7141.
|
[] | null | null | null | null |
|
GHSA-rf5h-29fq-hr47
|
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the email_attach_id parameter at /LHMail/AttachDown.aspx.
|
[] | null | 9.4 | null | null |
|
CVE-2022-23831
|
Insufficient validation of the IOCTL input buffer in AMD μProf may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service.
|
[
"cpe:2.3:a:amd:amd_uprof:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2021-39750
|
In PackageManager, there is a possible way to change the splash screen theme of other apps due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-206474016
|
[
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-572v-pm5r-97rp
|
Some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) were affected by a buffer overflow vulnerability in the arg4 and arg9 parameters of several functionalities of the web application that would allow an authenticated attacker to perform a Denial of Service attack, crashing the device, or potentially execute arbitrary code on the device.
|
[] | null | null | null | null |
|
CVE-2019-16510
|
libIEC61850 through 1.3.3 has a use-after-free in MmsServer_waitReady in mms/iso_mms/server/mms_server.c, as demonstrated by server_example_goose.
|
[
"cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2012-4035
|
The new_password page in PBBoard 2.1.4 allows remote attackers to change the password of arbitrary user accounts via the member_id and new_password parameters to index.php.
|
[
"cpe:2.3:a:pbboard:pbboard:2.1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-327w-jr39-3fwh
|
server/pm/UserManagerService.java in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to bypass intended restrictions on Wi-Fi configuration changes by leveraging guest access, aka internal bug 27411179.
|
[] | null | null | 5.5 | null |
|
GHSA-vvj2-hwcp-w2c5
|
This candidate was in a CNA pool that was not assigned to any issues during 2022.
|
[] | null | null | null | null |
|
GHSA-3m8g-vw47-p2rp
|
Integer overflow in the FORMATS Plugin before 4.23 for IrfanView allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large XPM file that triggers a heap-based buffer overflow.
|
[] | null | null | null | null |
|
GHSA-jqrg-p48v-g4w4
|
Cross-site scripting (XSS) vulnerability in webview.cpp in QtDemoBrowser allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a "universal XSS" issue, a similar vulnerability to CVE-2010-2536.
|
[] | null | null | null | null |
|
GHSA-8r7w-qmfc-f4gc
|
Unspecified vulnerability in Mahara before 0.9.1 has unknown impact and remote attack vectors, probably related to cross-site scripting (XSS) in uploaded files.
|
[] | null | null | null | null |
|
GHSA-xwhf-r489-w73v
|
An issue was discovered in TigerGraph Enterprise Free Edition 3.x. Data loading jobs in gsql_server, created by any user with designer permissions, can read sensitive data from arbitrary locations.
|
[] | null | 6.5 | null | null |
|
CVE-2012-4687
|
Post Oak Bluetooth Traffic Systems Insufficient Entropy
|
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
|
[
"cpe:2.3:h:postoaktraffic:awam_bluetooth_reader:-:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
CVE-2019-14291
|
An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 3.
|
[
"cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-p872-99gj-2vw3
|
ASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.
|
[] | null | 8.8 | null | null |
|
GHSA-4qhc-v8r6-8vwm
|
HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability
|
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
|
[] | null | 7.5 | null | null |
CVE-2014-2422
|
Unspecified vulnerability in Oracle Java SE 7u51 and 8, and JavaFX 2.2.51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:javafx:2.2.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-h93q-5v68-w53c
|
Integer signedness error in FreeBSD 6.0-RELEASE allows local users to cause a denial of service (memory corruption and kernel panic) via a PT_LWPINFO ptrace command with a large negative data value that satisfies a signed maximum value check but is used in an unsigned copyout function call.
|
[] | null | null | null | null |
|
CVE-2019-9921
|
An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to read information that should only be accessible by a different user.
|
[
"cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\\!:*:*"
] | null | null | 7.7 | null |
|
CVE-2018-18016
|
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-28:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-m4pq-fv2w-6hrw
|
Deno's deno_runtime vulnerable to interactive permission prompt spoofing via improper ANSI stripping
|
SummaryA maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents.DetailsIn [the patch for CVE-2023-28446](https://github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286d), Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences.For example, requesting the read permission with `/tmp/hello\u001b[/../../etc/hosts` as a path will display the `/tmp/hellotc/hosts` in the permission prompt, but the actual permission given to the program is `/tmp/hello\u001b[/../../etc/hosts`, which is `/etc/hosts` after the normalization.This difference allows a malicious Deno program to spoof the contents of the permission prompt.PoCRun the following JavaScript and observe that `/tmp/hellotc/hosts` is displayed in the permission prompt instead of `/etc/hosts`, although Deno gives access to `/etc/hosts`.Expected promptActual promptImpactAny Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user.
|
[] | null | 8.8 | null | null |
GHSA-9hr8-jgq4-7m7w
|
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the 'view' parameter in '/eventwinner/index.php'.
|
[] | null | 7.1 | null | null |
|
CVE-2024-53309
|
A stack-based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when an overly long string is passed to the "-f" parameter. This can lead to memory corruption, potentially allowing arbitrary code execution or causing a denial of service via specially crafted input.
|
[] | null | 5.5 | null | null |
|
CVE-2005-1556
|
Gamespy cd-key validation system allows remote attackers to cause a denial of service (cd-key already in use) by capturing and replaying a cd-key authorization session.
|
[
"cpe:2.3:a:gamespy:gamespy_sdk_cd-key_validation_toolkit:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-ffmr-8p66-95px
|
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
|
[] | null | null | 5.5 | null |
|
CVE-2013-1231
|
The HTTP implementation in Cisco WebEx Node for MCS and WebEx Meetings Server allows remote attackers to read cache files via a crafted request, aka Bug IDs CSCue36664 and CSCue36629.
|
[
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_node_for_mcs:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-26249
|
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue.
|
[
"cpe:2.3:a:cogboard:red-dashboard:0.1.2:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.3:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.4:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.5:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.6:alpha0:*:*:*:*:*:*"
] | null | 7.7 | null | null |
GHSA-mq45-cj46-gpg8
|
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password.
|
[] | null | null | null | null |
|
CVE-2024-43580
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-wm63-7mw9-jg6q
|
Windows SMBv3 Client/Server Remote Code Execution Vulnerability.
|
[] | null | 8.8 | null | null |
|
GHSA-g83h-xg2p-5qrr
|
The ThemeInstalledInfoBarDelegate::Observe function in browser/extensions/theme_installed_infobar_delegate.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle incorrect tab interaction by an extension, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted extension.
|
[] | null | null | null | null |
|
CVE-2014-5988
|
The Azkend Gold (aka com.the10tons.azkend.gold) application 1.2.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:getjar:azkend_gold:1.2.6:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-6hh6-59j2-qrxw
|
Silverstripe History XSS Vulnerability
|
A cross-site scripting vulnerability has been discovered in the CMS page history tab.This vulnerability can only be exploited if a user with CMS access has posted malicious or unescaped HTML into any of the text fields on a page, and if the "compare mode" option is selected. The HTML will be embedded into the page unescaped.This has been resolved by performing the text comparison in a HTML friendly way.
|
[] | null | 6.1 | null | null |
RHSA-2015:1439
|
Red Hat Security Advisory: wpa_supplicant security and enhancement update
|
hostapd: integer underflow in AP mode WMM Action frame processing
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2020-15131
|
False-positive validity for NFT1 genesis transactions in SLP Validate
|
In SLP Validate (npm package slp-validate) before version 1.2.2, there is a vulnerability to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. This is fixed in version 1.2.2.
|
[
"cpe:2.3:a:simpleledger:slp-validate:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-g9xq-w95r-h8gg
|
SQL injection vulnerability in iWebNegar allows remote attackers to execute arbitrary SQL commands via (1) the string parameter for index.php, (2) comments.php, or (3) the administrator login page.
|
[] | null | null | null | null |
|
GHSA-jxx2-55mc-35gm
|
A vulnerability in the web-based interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections by the affected software. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could change the password of a targeted user. An attacker could then take unauthorized actions on behalf of the targeted user.
|
[] | null | null | null | null |
|
CVE-2010-0522
|
Server Admin in Apple Mac OS X Server 10.5.8 does not properly determine the privileges of users who had former membership in the admin group, which allows remote authenticated users to leverage this former membership to obtain a server connection via screen sharing.
|
[
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-pr99-9g59-4vj9
|
The Download Manager WordPress plugin before 3.2.55 does not validate one of its settings, which could allow high privilege users such as admin to list and read arbitrary files and folders outside of the blog directory
|
[] | null | 4.9 | null | null |
|
GHSA-j4rv-c6x5-m7c5
|
In gpu_slc_get_region of pixel_gpu_slc.c, there is a possible EoP due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8.1 | null | null |
|
CVE-2013-3685
|
A Privilege Escalation Vulnerability exists in Sprite Software Spritebud 1.3.24 and 1.3.28 and Backup 2.5.4105 and 2.5.4108 on LG Android smartphones due to a race condition in the spritebud daemon, which could let a local malicious user obtain root privileges.
|
[
"cpe:2.3:a:spritesoftware:spritebackup:2.5.4105:*:*:*:*:*:*:*",
"cpe:2.3:a:spritesoftware:spritebackup:2.5.4108:*:*:*:*:*:*:*",
"cpe:2.3:a:spritesoftware:spritebud:1.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:spritesoftware:spritebud:1.3.28:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e971:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e973:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e975:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e975k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e975t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e976:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:e977:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f100k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f100l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f100s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f120k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f120l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f120s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f160k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f160l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f160lv:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f160s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f180k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f180l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f180s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f200k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f200l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f200s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f240k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f240l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f240s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f260k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f260l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:f260s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:l21_:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:lg870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:ls860:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:ls970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p780:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p875h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:p940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:su540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:su870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:us780:-:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 |
|
CVE-2012-4927
|
SQL injection vulnerability in Limesurvey (a.k.a PHPSurveyor) before 1.91+ Build 120224 and earlier allows remote attackers to execute arbitrary SQL commands via the fieldnames parameter to index.php.
|
[
"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.49:rc2:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.49_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.80:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.80\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.81:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.81\\+:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-7801
|
A Code Injection vulnerability exists in EVLink Parking, v3.2.0-12_v1 and earlier, which could enable access with maximum privileges when a remote code execution is performed.
|
[
"cpe:2.3:o:schneider-electric:evlink_parking_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_parking:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-xmvf-7wg4-234h
|
The kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.
|
[] | null | null | null | null |
|
CVE-2023-3009
|
Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass
|
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
|
[
"cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
CVE-2018-19167
|
CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
|
[
"cpe:2.3:a:cloakcoin:cloakcoin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2025:8636
|
Red Hat Security Advisory: perl-FCGI security update
|
perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library
|
[
"cpe:/o:redhat:enterprise_linux:10.0"
] | null | 7.5 | null | null |
GHSA-q2wc-95m2-mjxm
|
The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android) application before 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null |
|
GHSA-x977-5q6f-7pg9
|
CVE-2019-8643: Arun Sharma of VMWare This issue is fixed in macOS Mojave 10.14. Description: A logic issue was addressed with improved state management..
|
[] | null | null | null | null |
|
GHSA-rh6r-mvm2-jvgv
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.7.0.
|
[] | null | 7.1 | null | null |
|
GHSA-vwgw-5wg9-mw8j
|
The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
|
[] | null | null | null | null |
|
CVE-2024-56547
|
rcu/nocb: Fix missed RCU barrier on deoffloading
|
In the Linux kernel, the following vulnerability has been resolved:
rcu/nocb: Fix missed RCU barrier on deoffloading
Currently, running rcutorture test with torture_type=rcu fwd_progress=8
n_barrier_cbs=8 nocbs_nthreads=8 nocbs_toggle=100 onoff_interval=60
test_boost=2, will trigger the following warning:
WARNING: CPU: 19 PID: 100 at kernel/rcu/tree_nocb.h:1061 rcu_nocb_rdp_deoffload+0x292/0x2a0
RIP: 0010:rcu_nocb_rdp_deoffload+0x292/0x2a0
Call Trace:
<TASK>
? __warn+0x7e/0x120
? rcu_nocb_rdp_deoffload+0x292/0x2a0
? report_bug+0x18e/0x1a0
? handle_bug+0x3d/0x70
? exc_invalid_op+0x18/0x70
? asm_exc_invalid_op+0x1a/0x20
? rcu_nocb_rdp_deoffload+0x292/0x2a0
rcu_nocb_cpu_deoffload+0x70/0xa0
rcu_nocb_toggle+0x136/0x1c0
? __pfx_rcu_nocb_toggle+0x10/0x10
kthread+0xd1/0x100
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2f/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>
CPU0 CPU2 CPU3
//rcu_nocb_toggle //nocb_cb_wait //rcutorture
// deoffload CPU1 // process CPU1's rdp
rcu_barrier()
rcu_segcblist_entrain()
rcu_segcblist_add_len(1);
// len == 2
// enqueue barrier
// callback to CPU1's
// rdp->cblist
rcu_do_batch()
// invoke CPU1's rdp->cblist
// callback
rcu_barrier_callback()
rcu_barrier()
mutex_lock(&rcu_state.barrier_mutex);
// still see len == 2
// enqueue barrier callback
// to CPU1's rdp->cblist
rcu_segcblist_entrain()
rcu_segcblist_add_len(1);
// len == 3
// decrement len
rcu_segcblist_add_len(-2);
kthread_parkme()
// CPU1's rdp->cblist len == 1
// Warn because there is
// still a pending barrier
// trigger warning
WARN_ON_ONCE(rcu_segcblist_n_cbs(&rdp->cblist));
cpus_read_unlock();
// wait CPU1 to comes online and
// invoke barrier callback on
// CPU1 rdp's->cblist
wait_for_completion(&rcu_state.barrier_completion);
// deoffload CPU4
cpus_read_lock()
rcu_barrier()
mutex_lock(&rcu_state.barrier_mutex);
// block on barrier_mutex
// wait rcu_barrier() on
// CPU3 to unlock barrier_mutex
// but CPU3 unlock barrier_mutex
// need to wait CPU1 comes online
// when CPU1 going online will block on cpus_write_lock
The above scenario will not only trigger a WARN_ON_ONCE(), but also
trigger a deadlock.
Thanks to nocb locking, a second racing rcu_barrier() on an offline CPU
will either observe the decremented callback counter down to 0 and spare
the callback enqueue, or rcuo will observe the new callback and keep
rdp->nocb_cb_sleep to false.
Therefore check rdp->nocb_cb_sleep before parking to make sure no
further rcu_barrier() is waiting on the rdp.
|
[] | null | null | null | null |
GHSA-2qcc-4q33-8f32
|
Cross-Site Request Forgery (CSRF) vulnerability in WP EasyCart.This issue affects WP EasyCart: from n/a through 5.5.19.
|
[] | null | 5.4 | null | null |
|
GHSA-f5hg-xwhp-3gj9
|
H3C Magic B1ST v100R012 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
|
[] | null | 9.8 | null | null |
|
CVE-2024-6984
|
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm.
|
[
"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2023-52928
|
bpf: Skip invalid kfunc call in backtrack_insn
|
In the Linux kernel, the following vulnerability has been resolved:
bpf: Skip invalid kfunc call in backtrack_insn
The verifier skips invalid kfunc call in check_kfunc_call(), which
would be captured in fixup_kfunc_call() if such insn is not eliminated
by dead code elimination. However, this can lead to the following
warning in backtrack_insn(), also see [1]:
------------[ cut here ]------------
verifier backtracking bug
WARNING: CPU: 6 PID: 8646 at kernel/bpf/verifier.c:2756 backtrack_insn
kernel/bpf/verifier.c:2756
__mark_chain_precision kernel/bpf/verifier.c:3065
mark_chain_precision kernel/bpf/verifier.c:3165
adjust_reg_min_max_vals kernel/bpf/verifier.c:10715
check_alu_op kernel/bpf/verifier.c:10928
do_check kernel/bpf/verifier.c:13821 [inline]
do_check_common kernel/bpf/verifier.c:16289
[...]
So make backtracking conservative with this by returning ENOTSUPP.
[1] https://lore.kernel.org/bpf/CACkBjsaXNceR8ZjkLG=dT3P=4A8SBsg0Z5h5PWLryF5=ghKq=g@mail.gmail.com/
|
[] | null | null | null | null |
CVE-2021-28495
|
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train
|
[
"cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
PYSEC-2023-81
| null |
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176.
|
[] | null | null | null | null |
CVE-2024-9354
|
Estatik Mortgage Calculator <= 2.0.11 - Reflected Cross-Site Scripting
|
The Estatik Mortgage Calculator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'color' parameter in all versions up to, and including, 2.0.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null |
CVE-2023-52084
|
Winter CMS Stored XSS through Backend ColorPicker FormWidget
|
Winter is a free, open-source content management system. Prior to 1.2.4, Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be rendered unescaped in the backend form, potentially allowing for a stored XSS attack. This issue has been patched in v1.2.4.
|
[
"cpe:2.3:a:wintercms:winter:*:*:*:*:*:*:*:*"
] | null | 2 | null | null |
GHSA-wrgm-p49w-3hh3
|
ASUSTek ZenBook Pro Due 15 UX582 laptop firmware through 203 has Insecure Permissions that allow attacks by a physically proximate attacker.
|
[] | null | null | null | null |
|
CVE-2021-20637
|
Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/PR5B allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL.
|
[
"cpe:2.3:o:logitech:lan-w300n\\/pr5b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:logitech:lan-w300n\\/pr5b:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-xxcm-9w66-xprx
|
In IJG JPEG (aka libjpeg) before 9d, read_*_pixel() in rdtarga.c in cjpeg mishandles EOF.
|
[] | null | null | null | null |
|
GHSA-5ccq-w6wj-jcqq
|
An issue was discovered in Rehau devices that use a pCOWeb card BIOS v6.27, BOOT v5.00, web version v2.2, allows attackers to gain full unauthenticated access to the configuration and service interface.
|
[] | null | 7.5 | null | null |
|
CVE-2021-29836
|
IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-hjwh-ffhj-2hxf
|
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.
|
[] | null | 7.5 | null | null |
|
GHSA-73c7-5g37-cmq7
|
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
|
[] | null | null | 7.2 | null |
|
CVE-2022-32960
|
HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow
|
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
|
[
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*"
] | null | 6.8 | null | null |
CVE-2017-14648
|
A global buffer overflow was discovered in the iteration_loop function in loop.c in BladeEnc version 0.94.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution.
|
[
"cpe:2.3:a:bladeenc:bladeenc:0.94.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-4pv6-q257-8q33
|
An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4.8 through 6.4.10 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and the remote FortiGuard server hosting outbreakalert ressources.
|
[] | null | 8.1 | null | null |
|
GHSA-jfvq-2j38-f4q8
|
Directory traversal vulnerability in SnapStream PVS 1.2a allows remote attackers to read arbitrary files via a .. (dot dot) attack in the requested URL.
|
[] | null | null | null | null |
|
CVE-2018-0505
|
BotPasswords can bypass CentralAuth's account lock
|
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
CVE-2021-43676
|
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php.
|
[
"cpe:2.3:a:swoole:swoole_php_framework:3.0.5:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-3w9m-7j3j-w9p6
|
Power BI Report Server Spoofing Vulnerability
|
[] | null | 7.6 | null | null |
|
CVE-2025-7307
|
IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability
|
IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26388.
|
[] | null | null | 7.8 | null |
CVE-2023-33250
|
The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c.
|
[
"cpe:2.3:o:linux:linux_kernel:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2023-36136
|
PHPJabbers Class Scheduling System 1.0 lacks encryption on the password when editing a user account (update user page) allowing an attacker to capture all user names and passwords in clear text.
|
[
"cpe:2.3:a:phpjabbers:class_scheduling_system:1.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
RHSA-2013:1652
|
Red Hat Security Advisory: coreutils security, bug fix, and enhancement update
|
coreutils: segfault in "sort -d" and "sort -M" with long line input coreutils: segfault in uniq with long line input coreutils: segfault in "join -i" with long line input
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-6c52-p976-r7rq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in closed SOCIAL.NINJA allows Stored XSS. This issue affects SOCIAL.NINJA: from n/a through 0.2.
|
[] | null | 6.5 | null | null |
|
GHSA-6fw2-8jqq-27x2
|
Format string vulnerability in Soldner Secret Wars 30830 and earlier allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in a message.
|
[] | null | null | null | null |
|
CVE-2024-20715
|
Adobe Substance 3D Stager v2.1.1 Vulnerability VIII
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2023-41927
|
Weak TLS Cipher Suites Supported in Kiloview P1/P2 devices
|
The server supports at least one cipher suite which is on the NCSC-NL list of cipher suites to be phased out, increasing the risk of cryptographic weaknesses.
|
[] | null | 5.3 | null | null |
CVE-2018-11799
|
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
|
[
"cpe:2.3:a:apache:oozie:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:oozie:3.1.3:incubating:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-j8p2-hh7r-9r58
|
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
|
[] | null | null | null | null |
|
GHSA-5pww-x83q-7gjh
|
BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities.Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755.BSON-XS was the official Perl XS implementation of MongoDB's BSON serialization, but this distribution has reached its end of life as of August 13, 2020 and is no longer supported.
|
[] | null | 9.8 | null | null |
|
CVE-2024-52025
|
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at geniepppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[
"cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:1.0.4.128:*:*:*:*:*:*:*"
] | null | 5.7 | null | null |
|
GHSA-8pqc-m8ff-xf67
|
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
|
[] | null | 5.5 | null | null |
|
GHSA-2rpv-5gq5-8p5q
|
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."
|
[] | null | null | 7.5 | null |
|
GHSA-rvj9-2hjw-96xg
|
Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536.
|
[] | null | null | null | null |
|
GHSA-492c-rr88-qfhx
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
|
[] | null | 8.8 | null | null |
|
GHSA-j5vp-xx87-j2xg
|
Apple Safari allows remote attackers to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.styleSheets[0].href property value.
|
[] | null | null | null | null |
|
CVE-2020-4022
|
The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a mixed multipart content type.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2017-12988
|
The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-52gj-mvxw-vcvp
|
Cisco Videoscape Distribution Suite Service Manager (VDS-SM) 3.4.0 and earlier does not always use RBAC for backend database access, which allows remote authenticated users to read or write to database entries via (1) the GUI or (2) a crafted HTTP request, aka Bug ID CSCuv87025.
|
[] | null | null | null | null |
|
GHSA-8474-rc7c-wrhp
|
High severity vulnerability that affects safemode
|
Withdrawn, accidental duplicate publish.The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.