id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2012-4920 | Directory traversal vulnerability in the zing_forum_output function in forum.php in the Zingiri Forum (aka Forums) plugin before 1.4.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter to index.php. | [
"cpe:2.3:a:zingiri:forums:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-cvvg-xj5x-rq7p | Basic Job Site Script 2.0.5 has SQL Injection via the keyword parameter to /job. | []
| null | null | 9.8 | null |
|
CVE-2023-36947 | TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the File parameter in the function UploadCustomModule. | [
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2024-6580 | /n software IPWorks SSH insufficient file access verification | The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application). IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates. | []
| 2.3 | null | null | null |
CVE-2024-25559 | URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log. | []
| null | 4.7 | null | null |
|
GHSA-g774-59fg-m3fv | IBM Rhapsody DM 4.0, 5.0, and 6.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM Reference #: 1999960. | []
| null | null | 5.4 | null |
|
CVE-2025-48279 | WordPress WC MyParcel Belgium plugin <= 4.5.5-beta - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Perdaan WC MyParcel Belgium allows Reflected XSS. This issue affects WC MyParcel Belgium: from 4.5.5 through beta. | []
| null | 7.1 | null | null |
CVE-2024-26445 | flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_place.php | [
"cpe:2.3:a:flusity:flusity:2.33:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
CVE-2023-20172 | Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities | Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
CVE-2025-2483 | Gift Certificate Creator <= 1.1.0 - Reflected Cross-Site Scripting via receip_address Parameter | The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘receip_address’ parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
CVE-2021-43952 | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0. | [
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4.3 |
|
CVE-2022-33259 | Buffer copy without checking the size of input in Modem | Memory corruption due to buffer copy without checking the size of input in modem while decoding raw SMS received. | [
"cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-8r6f-5p66-vjcg | Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sedge() seh->incident_sface(). | []
| null | 8.8 | null | null |
|
CVE-2021-31930 | Persistent cross-site scripting (XSS) in the web interface of Concerto through 2.3.6 allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the First Name or Last Name parameter upon registration. When a privileged user attempts to delete the account, the XSS payload will be executed. | [
"cpe:2.3:a:concerto-signage:concerto:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2022-21241 | Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag. | [
"cpe:2.3:a:csv\\+_project:csv\\+:*:*:*:*:*:*:*:*"
]
| null | 9.6 | null | 6.8 |
|
CVE-2016-1051 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1052, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1067, CVE-2016-1068, CVE-2016-1069, CVE-2016-1070, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, CVE-2016-4102, and CVE-2016-4107. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
RHSA-2010:0543 | Red Hat Security Advisory: openldap security update | OpenLDAP: Doesn't properly handle NULL character in subject Common Name openldap: modrdn processing uninitialized pointer free | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2009:0354 | Red Hat Security Advisory: evolution-data-server security update | evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM) evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-4528-vmxj-v97w | Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUT | []
| null | 5.3 | null | null |
|
GHSA-w4xr-64f9-95cj | SQL injection vulnerability in getin.php in WEBBDOMAIN Petition 1.02, 2.0, and 3.0 allows remote attackers to execute arbitrary SQL commands via the username parameter. | []
| null | null | null | null |
|
GHSA-fqfp-r4jq-mf88 | ** DISPUTED ** An issue has been found in HTSlib 1.8. It is a memory leak in bgzf_getline in bgzf.c. NOTE: the software maintainer's position is that the "failure to free memory" can be fixed in applications that use the HTSlib library (such as test/test_bgzf.c in the original report) and is not a library issue. | []
| null | null | 7.5 | null |
|
CVE-2023-38200 | Keylime: registrar is subject to a dos against ssl connections | A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections. | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:2.3:a:keylime:keylime:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-5mg6-xp8p-mrrm | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | []
| null | 8.1 | null | null |
|
CVE-2022-21677 | Group advanced search option may leak group and group's members visibility | Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-p2pr-pr72-vg5h | A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list_count function, which causes a Denial of Service. | []
| null | 5.5 | null | null |
|
GHSA-3jf4-7gx3-875f | SQL Injection exists in the Saxum Picker 3.2.10 component for Joomla! via the publicid parameter. | []
| null | null | 9.8 | null |
|
GHSA-hm78-pq45-736h | The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets. | []
| null | null | null | null |
|
CVE-2012-3337 | IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to download arbitrary files on the system. IBM X-Force ID: 78284. | [
"cpe:2.3:a:ibm:infosphere_guardium:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_guardium:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_guardium:8.2:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
|
GHSA-7h9q-985f-8xvm | Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file. This vulnerability affects Thunderbird < 78.10. | []
| null | null | null | null |
|
CVE-2019-13200 | The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Reflected XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions. | [
"cpe:2.3:o:kyocera:ecosys_m5526cdw_firmware:2r7_2000.001.701:*:*:*:*:*:*:*",
"cpe:2.3:h:kyocera:ecosys_m5526cdw:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2024-11289 | Soledad <= 8.5.9 - Unauthenticated Limited Local File Inclusion | The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.5.9 via several functions like penci_archive_more_post_ajax_func, penci_more_post_ajax_func, and penci_more_featured_post_ajax_func. This makes it possible for unauthenticated attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. The exploitability of this is limited to Windows. | [
"cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*"
]
| null | 8.1 | null | null |
CVE-2018-18259 | Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page. | [
"cpe:2.3:a:luya:luya_cms:1.0.12:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-r82m-w472-8wp9 | JaguarEditControl (JEdit) ActiveX Control 1.1.0.20 and earlier allows remote attackers to obtain sensitive information, such as the username and MAC and IP addresses, by setting the test field to certain values such as 2404 or 2790, then reading the information from the .JText field. | []
| null | null | null | null |
|
CVE-2024-21114 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2017-9538 | The 'Upload logo from external path' function of SolarWinds Network Performance Monitor version 12.0.15300.90 allows remote attackers to cause a denial of service (permanent display of a "Cannot exit above the top directory" error message throughout the entire web application) via a ".." in the path field. In other words, the denial of service is caused by an incorrect implementation of a directory-traversal protection mechanism. | [
"cpe:2.3:a:solarwinds:network_performance_monitor:*:*:*:*:*:*:*:*"
]
| null | null | 4.9 | 4 |
|
GHSA-xvfq-f68m-7mwg | In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server. | []
| null | 5.9 | null | null |
|
GHSA-2f6x-gfvg-4xxv | Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764. | []
| null | null | 7.5 | null |
|
RHSA-2024:8694 | Red Hat Security Advisory: OpenShift Container Platform 4.12.68 security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
]
| null | 6.8 | null | null |
GHSA-7f5r-c898-j27q | XnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77400000!RtlGetCurrentDirectory_U+0x000000000000016c." | []
| null | null | 7.8 | null |
|
CVE-2025-32710 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. | []
| null | 8.1 | null | null |
PYSEC-2021-822 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `DeserializeSparse` can trigger a null pointer dereference. This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | []
| null | null | null | null |
GHSA-c4j8-5xv4-xcxh | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | []
| null | 4.3 | null | null |
|
GHSA-qr8g-7hrw-635q | Missing Authorization vulnerability in xola.com Xola allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Xola: from n/a through 1.6. | []
| null | 4.3 | null | null |
|
CVE-2022-42970 | A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261) | [
"cpe:2.3:a:schneider-electric:apc_easy_ups_online_monitoring_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:easy_ups_online_monitoring_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-hrw5-976x-g3p6 | A vulnerability, which was classified as critical, has been found in PHPGurukul News Portal 4.1. This issue affects some unknown processing of the file /login.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
RHSA-2019:2805 | Red Hat Security Advisory: systemd security update | systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
]
| null | null | 7 | null |
RHSA-2002:026 | Red Hat Security Advisory: : : : Vulnerability in zlib library | zlib: Double free in inflateEnd security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
]
| null | 7 | null | null |
CVE-2020-14378 | An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period. | [
"cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
]
| null | 3.3 | null | 2.1 |
|
GHSA-5gph-qpg6-5c3p | An issue in Diebold Nixdorf Vynamic View Console v.5.3.1 and before allows a local attacker to execute arbitrary code via not restricting the search path for required DLLs and not verifying the signature. | []
| null | 7.8 | null | null |
|
CVE-2020-10434 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-versions.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
CVE-2008-3740 | Cross-site scripting (XSS) vulnerability in the output filter in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-43xh-764p-9whg | The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | []
| null | null | null | null |
|
GHSA-49r2-m5f5-3pvr | Aruba Networks ClearPass before 6.3.5 and 6.4.x before 6.4.1 allows remote attackers to execute arbitrary commands via unspecified vectors, a different vulnerability than CVE-2014-6627. | []
| null | null | null | null |
|
CVE-2024-9611 | Increase upload file size & Maximum Execution Time limit <= 2.0 - Reflected Cross-Site Scripting | The Increase upload file size & Maximum Execution Time limit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
CVE-2008-1121 | SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie. | [
"cpe:2.3:a:eazyportal:eazyportal:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-v7xc-6mwj-7f9m | u'Third-party app may also call the broadcasts in Perfdump and cause privilege escalation issue due to improper access control' in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8909W, MSM8917, MSM8940, Nicobar, QCA6390, QCM2150, QCS605, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429W, SDM450, SDM630, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | []
| null | null | null | null |
|
GHSA-xm4h-5598-382p | The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. (Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.) The code error is in gravity_DownloadBlocklistFromUrl in gravity.sh. | []
| null | null | null | null |
|
GHSA-2fp2-wfm4-76mp | The training-registration page in Cisco WebEx Training Center allows remote attackers to modify unspecified fields via unknown vectors, aka Bug ID CSCul35990. | []
| null | null | null | null |
|
GHSA-c9m6-xrqf-8m66 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22592. | []
| null | null | 7.8 | null |
|
GHSA-fw57-89vj-7gfh | The affected devices use publicly available default credentials with administrative privileges. | []
| null | 9.8 | null | null |
|
GHSA-7j6g-h8xc-2hrv | A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges. | []
| null | null | null | null |
|
CVE-2016-4969 | Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php. | [
"cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-3xpw-25qv-r984 | Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248. | []
| null | 5.5 | null | null |
|
CVE-2017-13687 | The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-4m84-qqp5-f6jr | Memory corruption in MODEM UIM due to usage of out of range pointer offset while decoding command from card in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | []
| null | 7.8 | null | null |
|
GHSA-35p2-9fg3-f2p2 | A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon. | []
| null | 6.5 | null | null |
|
GHSA-p88h-2rv9-3575 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Powerfusion WPAchievements Free allows Stored XSS.This issue affects WPAchievements Free: from n/a through 1.2.0. | []
| null | 6.5 | null | null |
|
CVE-2025-21296 | BranchCache Remote Code Execution Vulnerability | BranchCache Remote Code Execution Vulnerability | []
| null | 7.5 | null | null |
GHSA-wg9r-22jj-fhcq | The WP Statistics WordPress plugin before 13.2.2 does not sanitise the REQUEST_URI parameter before outputting it back in the rendered page, leading to Cross-Site Scripting (XSS) in web browsers which do not encode characters | []
| null | 6.1 | null | null |
|
GHSA-49w4-8c2m-qh25 | Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. | []
| null | null | null | null |
|
CVE-2018-8034 | The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*"
]
| null | 7.5 | 7.5 | 5 |
|
GHSA-r96m-mwvr-946h | Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via list columns from user preferences. | []
| null | 6.1 | null | null |
|
GHSA-ghvm-v65v-6pc7 | SQL injection vulnerability in index.php in CS-Cart 2.0.0 Beta 3 allows remote attackers to execute arbitrary SQL commands via the product_id parameter in a products.view action. | []
| null | null | null | null |
|
CVE-2023-2573 | Authenticated Command Injection | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request. | [
"cpe:2.3:o:advantech:eki-1521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-1522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-1524_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1524:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-r5j6-vjxh-3v3w | ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the DIA_IPADDRESS parameter. | []
| null | null | 9.8 | null |
|
CVE-2023-22085 | Vulnerability in the Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Opera). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in takeover of Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.6:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-jqpq-72xc-xqvj | Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php. | []
| null | null | null | null |
|
GHSA-phwc-7hvm-qv33 | A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /ajax.php?action=save_quiz. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273352. | []
| 5.3 | 3.5 | null | null |
|
CVE-2024-0753 | In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2024-0929 | Tenda AC10U fromNatStaticSetting stack-based overflow | A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*"
]
| null | 4.7 | 4.7 | 5.8 |
CVE-2009-0135 | Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow. | [
"cpe:2.3:a:amarok:amarok:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:amarok:amarok:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:amarok:amarok:2.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-58wf-w6hc-fcfx | ovactiond in HP OpenView Network Node Manager (NNM) 6.1 and Tivoli Netview 5.x and 6.x allows remote attackers to execute arbitrary commands via shell metacharacters in a certain SNMP trap message. | []
| null | null | null | null |
|
GHSA-jx9j-wc7x-r73w | Novel-Plus v3.6.2 was discovered to contain an arbitrary file download vulnerability via the background file download API. | []
| null | 7.5 | null | null |
|
CVE-2024-44225 | A logic issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to gain elevated privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2020-7585 | A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information. | [
"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_process_device_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:5.6:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:5.6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:5.6:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:5.6:sp2_hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinamics_starter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinamics_starter:5.4:-:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2016-2272 | Eaton Lighting EG2 Web Control 4.04P and earlier allows remote attackers to have an unspecified impact via a modified cookie. | [
"cpe:2.3:a:eaton_lighting_systems:eg2_web_control:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2024-37325 | Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability | Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_data_science_virtual_machine:*:*:*:*:*:linux:*:*"
]
| null | 8.1 | null | null |
GHSA-q4w4-v939-f8rm | The Spiritual Gifts Survey (and optional S.H.A.P.E survey) WordPress plugin through 0.9.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users. | []
| null | 6.1 | null | null |
|
CVE-2004-2220 | F-Secure Anti-Virus for Microsoft Exchange 6.30 and 6.31 does not properly detect certain password-protected files in a ZIP file, which allows remote attackers to bypass anti-virus protection. | [
"cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*",
"cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*",
"cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2008-2898 | Directory traversal vulnerability in includes/header.php in Hedgehog-CMS 1.21 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the c_temp_path parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. | [
"cpe:2.3:a:hedgehog-cms:hedgehog-cms:1.21:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-w9wr-qppp-mh4c | Multiple cross-site scripting (XSS) vulnerabilities in ActiveKB NX 2.5.4 allow remote attackers to inject arbitrary web script or HTML via the page parameter to the default URI for some directories, as demonstrated by (1) ActiveKB/ and (2) default/categories/ActiveKB/. | []
| null | null | null | null |
|
GHSA-764p-pqfm-x2x7 | The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size. | []
| null | 4.4 | null | null |
|
GHSA-2pgv-ghf3-xj9q | LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution | []
| null | null | 9.8 | null |
|
GHSA-v484-r27j-mv8x | Cross-Site Request Forgery (CSRF) vulnerability in ShortPixel ShortPixel Adaptive Images.This issue affects ShortPixel Adaptive Images: from n/a through 3.8.3. | []
| null | 4.3 | null | null |
|
CVE-2017-10673 | admin/profile.php in GetSimple CMS 3.x has XSS in a name field. | [
"cpe:2.3:a:get-simple:getsimple_cms:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:get-simple:getsimple_cms:3.3.2:b3:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-qv2x-7mqw-c4mf | Missing Authorization vulnerability in LiquidPoll LiquidPoll – Advanced Polls for Creators and Brands allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LiquidPoll – Advanced Polls for Creators and Brands: from n/a through 3.3.68. | []
| null | 4.3 | null | null |
|
GHSA-qq75-75c9-p3pm | Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 allow remote attackers to execute arbitrary code via (1) a link with a long HREF attribute, and (2) a DIV tag with a long id attribute. | []
| null | null | null | null |
|
RHSA-2022:6541 | Red Hat Security Advisory: php:7.4 security update | Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 7.5 | null | null |
CVE-2018-18815 | TIBCO JasperReports Server User Information Disclosure | The REST API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability that theoretically allows unauthenticated users to bypass authorization checks for portions of the HTTP interface to the JasperReports Server. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0. | [
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*"
]
| null | null | 10 | null |
GHSA-2986-5hcf-cm8g | When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.