id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2006-5598 | Cross-site scripting (XSS) vulnerability in index.php for GOOP Gallery 2.0, and possibly other versions before 2.0.3, allows remote attackers to inject arbitrary HTML or web script via the image parameter. | [
"cpe:2.3:a:webgeneius:goop_gallery:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgeneius:goop_gallery:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgeneius:goop_gallery:2.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-f8wg-jjwm-9xhm | Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1660. | []
| null | null | null | null |
|
CVE-2008-1501 | The send_user_mode function in s_user.c in (1) Undernet ircu 2.10.12.12 and earlier, (2) snircd 1.3.4 and earlier, and unspecified other ircu derivatives allows remote attackers to cause a denial of service (daemon crash) via a malformed MODE command. | [
"cpe:2.3:a:ircu:ircu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quakenet:snircd:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2019-13012 | The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450. | [
"cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2021-35298 | Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via multiple models that contain a 'note' field to store additional information. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2022-45760 | SENS v1.0 is vulnerable to Incorrect Access Control vulnerability. | [
"cpe:2.3:a:sens_project:sens:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2024-48589 | Cross Site Scripting vulnerability in Gilnei Moraes phpABook v.0.9 allows a remote attacker to execute arbitrary code via the rol parameter in index.php | []
| null | 6.3 | null | null |
|
CVE-2021-20641 | Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/RS allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted. | [
"cpe:2.3:o:logitech:lan-w300n\\/rs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:logitech:lan-w300n\\/rs:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
CVE-2023-52387 | Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-9rh3-jvpx-vjch | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <= 1.4 versions. | []
| null | 7.1 | null | null |
|
CVE-2019-0232 | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 9.3 |
|
GHSA-hxrr-8f87-qrgp | An XSS vulnerability exists in several IoT devices from CHIYU Technology, including SEMAC, Biosense, BF-630, BF-631, and Webpass due to a lack of sanitization on the component if.cgi - username parameter. | []
| null | null | null | null |
|
CVE-2025-5908 | TOTOLINK EX1200T HTTP POST Request formIpQoS buffer overflow | A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 8.7 | 8.8 | 8.8 | 9 |
GHSA-qx39-cc42-mq9j | SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service. | []
| null | null | null | null |
|
RHSA-2020:2165 | Red Hat Security Advisory: openstack-manila security update | openstack-manila: User with share-network UUID is able to show, create and delete shares | [
"cpe:/a:redhat:openstack:16::el8"
]
| null | 8.3 | null | null |
GHSA-8p9c-2m9q-35ff | Helmet Store Showroom v1.0 vulnerable to unauthenticated SQL Injection. | []
| null | 9.8 | null | null |
|
GHSA-ffw3-6378-cqgp | mlflow vulnerable to OS Command Injection | OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | []
| null | null | 8.8 | null |
CVE-2006-3956 | Multiple cross-site scripting (XSS) vulnerabilities in contact.php in Advanced Webhost Billing System (AWBS) 2.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) AccountUsername and (3) Message parameters. | [
"cpe:2.3:a:total_online_solutions:advanced_webhost_billing_system:2.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2023-28502 | Stack buffer overflow in UniRPC's udadmin_server service | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow in the "udadmin" service that can lead to remote code execution as the root user. | [
"cpe:2.3:a:rocketsoftware:unidata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketsoftware:universe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-h3p3-hmmw-2p8j | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117. | []
| null | null | null | null |
|
CVE-2025-5428 | juzaweb CMS Error Logs Page log-viewer access control | A vulnerability classified as critical has been found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/log-viewer of the component Error Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-5jjr-9ghm-5r56 | SAP BusinessObjects Business Intelligence Platform (Open Document) - versions 430, 430, allows an unauthenticated attacker to retrieve sensitive information plain text over the network. On successful exploitation, the attacker can view any data available for a business user and put load on the application by an automated attack. Thus, completely compromising confidentiality but causing a limited impact on the availability of the application. | []
| null | 8.2 | null | null |
|
GHSA-jx9w-xwx8-w7hj | An issue was discovered in the image-manager in Xoops 2.5.10. When any image with a JavaScript payload as its name is hovered over in the list or in the Edit page, the payload executes. | []
| null | 4.8 | null | null |
|
RHSA-2023:2165 | Red Hat Security Advisory: edk2 security, bug fix, and enhancement update | edk2: integer underflow in SmmEntryPoint function leads to potential SMM privilege escalation openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.4 | null | null |
GHSA-qhh4-qwj6-wv5c | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Portal - Web Services. | []
| null | null | null | null |
|
CVE-2025-4926 | PHPGurukul Car Rental Project post-avehical.php unrestricted upload | A vulnerability was found in PHPGurukul Car Rental Project 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/post-avehical.php. The manipulation of the argument img1/img2/img3/img4/img5 leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 5.1 | 4.7 | 4.7 | 5.8 |
CVE-2014-9781 | Buffer overflow in drivers/video/fbcmap.c in the Qualcomm components in Android before 2016-07-05 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28410333 and Qualcomm internal bug CR556471. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-hgwf-x3rj-c9m5 | Jigsaw 2.2.1 on Windows systems allows remote attackers to use MS-DOS device names in HTTP requests to (1) cause a denial of service using the "con" device, or (2) obtain the physical path of the server using two requests to the "aux" device. | []
| null | null | null | null |
|
CVE-2021-28848 | Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change. | [
"cpe:2.3:a:mintty_project:mintty:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-rxp5-374g-r979 | Cross-Site Request Forgery (CSRF) vulnerability in Affieasy Team AffiEasy.This issue affects AffiEasy: from n/a through 1.1.4. | []
| null | 4.3 | null | null |
|
CVE-2018-14060 | OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data. | [
"cpe:2.3:o:mi:xiaomi_r3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:xiaomi_r3d:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-j3j5-w2hq-cw74 | An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation. | []
| null | 5.5 | null | null |
|
GHSA-xcjv-gj29-fmm5 | SQL injection vulnerability in videogalleryrss.php in the Apptha WordPress Video Gallery (contus-video-gallery) plugin before 2.8 for WordPress allows remote attackers to execute arbitrary SQL commands via the vid parameter in a rss action to wp-admin/admin-ajax.php. | []
| null | null | null | null |
|
CVE-2021-45056 | Adobe InCopy JPEG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe InCopy version 16.4 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
CVE-2016-6530 | Dentsply Sirona (formerly Schick) CDR Dicom 5 and earlier has default passwords for the sa and cdr accounts, which allows remote attackers to obtain administrative access by leveraging knowledge of these passwords. | [
"cpe:2.3:a:dentsply_sirona:cdr_dicom:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2014-2399 | Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 2.2.2 allows remote attackers to affect integrity via unknown vectors related to Oracle Endeca Information Discovery (Formerly Latitude), a different vulnerability than CVE-2014-2400. | [
"cpe:2.3:a:oracle:fusion_middleware:2.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2011-3101 | Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors. NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2018-18348 | Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 |
|
CVE-2025-31807 | WordPress Product Notices for WooCommerce plugin <= 1.3.3 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in CloudRedux Product Notices for WooCommerce allows Cross Site Request Forgery. This issue affects Product Notices for WooCommerce: from n/a through 1.3.3. | []
| null | 4.3 | null | null |
CVE-2019-14396 | API Analytics adminbin in cPanel before 80.0.5 allows spoofed insertions of log data (SEC-495). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
| null | null | 3.3 | 2.1 |
|
CVE-2020-16261 | Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access. | [
"cpe:2.3:o:winstonprivacy:winston_firmware:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:winstonprivacy:winston:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | 7.2 |
|
GHSA-rqfh-7fx4-3747 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44676. | []
| null | 8.1 | null | null |
|
RHSA-2022:0989 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet | [
"cpe:/a:redhat:openstack:16.1::el8"
]
| null | 7.3 | null | null |
GHSA-x87h-26m9-h8qm | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | []
| null | null | 9.8 | null |
|
GHSA-gjhc-6xm7-mc8q | Duplicate Advisory: Cross-site scripting vulnerability in TinyMCE | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-5h9g-x5rv-25wg. This link is maintained to preserve external references.Original DescriptionTinyMCE versions before 5.9.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser. | []
| null | null | null | null |
GHSA-grpm-838p-c5h4 | The Rearrange Woocommerce Products WordPress plugin before 3.0.8 does not have proper access controls in the save_all_order AJAX action, nor validation and escaping when inserting user data in SQL statement, leading to an SQL injection, and allowing any authenticated user, such as subscriber, to modify arbitrary post content (for example with an XSS payload), as well as exfiltrate any data by copying it to another post. | []
| null | 6.5 | null | null |
|
CVE-2019-12530 | Incorrect access control was discovered in the stdonato Dashboard plugin through 0.9.7 for GLPI, affecting df.php, issue.php, load.php, mem.php, traf.php, and uptime.php in front/sh. | [
"cpe:2.3:a:glpi_dashboard_project:glpi_dashboard:*:*:*:*:*:glpi:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-3729-fh52-2ph2 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to gain root privileges. | []
| null | 7.8 | null | null |
|
GHSA-wv8q-4f85-2p8p | MLflow Path Traversal Vulnerability | This vulnerability is capable of writing arbitrary files into arbitrary locations on the remote filesystem in the context of the server process. | []
| null | null | 8.8 | null |
CVE-2023-39808 | N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a hardcoded root password which allows attackers to login with root privileges via the SSH service. | [
"cpe:2.3:a:nvki:intelligent_broadband_subscriber_gateway:3.5:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-wx2c-j97m-grcg | A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115. | []
| null | 6.5 | null | null |
|
GHSA-gcqr-v3j7-qf2p | Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of the `FST_BL_VCDATA_DYN_ALIAS2` section type. | []
| null | 7.8 | null | null |
|
RHSA-2023:1101 | Red Hat Security Advisory: kpatch-patch security update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | 7.8 | null | null |
cisco-sa-iosxe-cip-dos-9rTbKLt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74745"] | []
| null | 8.6 | null | null |
GHSA-7ww3-882h-f36x | Multiple SQL injection vulnerabilities in Avaya SIP Enablement Services (SES) in Avaya Avaya Communication Manager 3.x, 4.0, and 5.0 (1) allow remote attackers to execute arbitrary SQL commands via unspecified vectors related to profiles in the SIP Personal Information Manager (SPIM) in the web interface; and allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors related to (2) permissions for SPIM profiles in the web interface and (3) a crafted SIP request to the SIP server. | []
| null | null | null | null |
|
CVE-2006-5627 | Multiple PHP remote file inclusion vulnerabilities in QnECMS 2.5.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the adminfolderpath parameter to (1) headerscripts.php, (2) footerhome.php, and (3) footermain.php in admin/include/; (4) photogallery/headerscripts.php; and (5) footerhome.php, (6) footermain.php, (7) headermain.php, (8) sitemapfooter.php, and (9) sitemapheader.php in templates/. | [
"cpe:2.3:a:qnecms:qnecms:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2009-5075 | Monkey's Audio before 4.02 allows remote attackers to cause a denial of service (application crash) via a malformed APE file. | [
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:*:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.62:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.63:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.71:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.72:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.81:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.82:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.83:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.91:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.40:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.40:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.71:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.81:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.82:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.83:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.84:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.85:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta1:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta2:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta2:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.88:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.89:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.90:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.91:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.92:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.94:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.95:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.96:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.97:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.99:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:4.01b1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2017-3165 | In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site scripting where one authenticated user can cause scripts to run in the browser of another user authorized to access the first user's resources. This is due to improper escaping of server-side content. There is known to be a proof-of-concept exploit using this vulnerability. | [
"cpe:2.3:a:apache:brooklyn:*:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
CVE-2024-13246 | Node Access Rebuild Progressive - Less critical - Access bypass - SA-CONTRIB-2024-010 | Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 0.0.0 before 2.0.2. | []
| null | 5.3 | null | null |
GHSA-w2m4-mx84-gv3g | Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive. | []
| null | null | null | null |
|
CVE-2023-29389 | Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022. | [
"cpe:2.3:o:toyota:rav4_firmware:2021:*:*:*:*:*:*:*",
"cpe:2.3:h:toyota:rav4:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | null |
|
GHSA-c6rc-339q-x354 | Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddVpnUsers. This vulnerability allows attackers to cause a Denial of Service (DoS) via the vpnUsers parameter. | []
| null | null | null | null |
|
CVE-2019-8578 | A use after free issue was addressed with improved memory management. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution. | [
"cpe:2.3:o:apple:airport_base_station_firmware:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-994w-h7w5-73v7 | A directory listing vulnerability in School Fees Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization. | []
| null | 7.5 | null | null |
|
CVE-2020-25704 | A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:starwindsoftware:command_center:-:*:*:*:*:*:*:*",
"cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:starwindsoftware:starwind_san_\\&_nas:v8r12:*:*:*:*:*:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14398:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
CVE-2018-9335 | The PAN-OS session browser in PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.9 and earlier, and PAN-OS 8.1.1 and earlier may allow an attacker to inject arbitrary JavaScript or HTML. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
GHSA-jv8r-v35h-qv47 | A Cross Site Scriptiong (XSS) vulnerability exists in the admin panel in Webuzo < 2.9.0 via an HTTP request to a non-existent page, which is activated by administrators viewing the "Error Log" page. An attacker can leverage this to achieve Unauthenticated Remote Code Execution via the "Cron Jobs" functionality of Webuzo. | []
| null | null | null | null |
|
GHSA-vhpp-25xj-gvg7 | An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1253, CVE-2020-1310. | []
| null | null | null | null |
|
CVE-2023-52478 | HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect | In the Linux kernel, the following vulnerability has been resolved:
HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.
hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.
This opens the following races (note the below code is simplified):
1. Retrieving + printing the protocol (harmless race):
if (!hidpp->protocol_major) {
hidpp_root_get_protocol_version()
hidpp->protocol_major = response.rap.params[0];
}
We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:
[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:
2. Updating the name to the HIDPP name (harmless race):
if (hidpp->name == hdev->name) {
...
hidpp->name = new_name;
}
3. Initializing the power_supply class for the battery (problematic!):
hidpp_initialize_battery()
{
if (hidpp->battery.ps)
return 0;
probe_battery(); /* Blocks, threads take turns executing this */
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
}
4. Creating delayed input_device (potentially problematic):
if (hidpp->delayed_input)
return;
hidpp->delayed_input = hidpp_allocate_input(hdev);
The really big problem here is 3. Hitting the race leads to the following
sequence:
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
...
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.
Notice how:
1. This is all devm-maganaged
2. The hidpp->battery.desc struct is shared between the 2 power supplies
3. hidpp->battery.desc.properties points to the result from the second
devm_kmemdup()
This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
hidpp->battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
this involves sending a remove uevent to userspace which invokes
power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp->battery.desc.properties which
now points to freed memory leading to backtraces like this one:
Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*"
]
| null | 4.7 | null | null |
GHSA-fj5m-5qc8-rw48 | IBM Lotus Notes Traveler before 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request. | []
| null | null | null | null |
|
GHSA-wvcw-6x42-j4h9 | FuzeZip 1.0.0.131625 has a Local Buffer Overflow vulnerability | []
| null | null | null | null |
|
GHSA-738r-q8gh-xrrc | The elliptic curve cryptography (ECC) hardware accelerator, part of the ARM® TrustZone® CryptoCell 310, contained in the NordicSemiconductor nRF52840 through 2021-03-29 has a non-constant time ECDSA implemenation. This allows an adversary to recover the private ECC key used during an ECDSA operation. | []
| null | 5.5 | null | null |
|
CVE-2021-34173 | An attacker can cause a Denial of Service and kernel panic in v4.2 and earlier versions of Espressif esp32 via a malformed beacon csa frame. The device requires a reboot to recover. | [
"cpe:2.3:o:espressif:esp32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
GHSA-r2j2-hq8w-23q8 | An ActiveX control in NationalInstruments.Help2.dll in National Instruments NI .NET Class Library Help, as used in Measurement Studio 2013 and earlier and other products, allows remote attackers to obtain sensitive information about the existence of registry keys via crafted (1) key-open or (2) key-close method calls. | []
| null | null | null | null |
|
GHSA-8g8g-9f4q-f275 | The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow. | []
| null | null | null | null |
|
GHSA-mfgc-pq48-8r3j | A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources. | []
| null | 5.7 | null | null |
|
CVE-2023-52268 | The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub. | [
"cpe:2.3:a:freescout_helpdesk:freescout:*:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
|
GHSA-vh5c-rcpj-3744 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031. | []
| null | null | 9.8 | null |
|
CVE-2018-15413 | Cisco Webex Network Recording Player and Cisco Webex Player Remote Code Execution Vulnerabilities | A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. | [
"cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release5_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_32:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_33:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
CVE-2024-52304 | aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue. | [
"cpe:2.3:a:python:aiohttp:*:*:*:*:*:*:*:*"
]
| 6.3 | null | null | null |
CVE-2021-35618 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]
| null | 1.8 | null | null |
|
GHSA-w4p7-r5vj-mhx5 | Common LaTeX Service Interface (CLSI) before 0.1.3, as used in ShareLaTeX before 0.1.3, allows remote authenticated users to execute arbitrary code via ` (backtick) characters in a filename. | []
| null | null | null | null |
|
GHSA-2crp-qj3p-4444 | Windows DNS Spoofing Vulnerability | []
| null | 7.5 | null | null |
|
RHSA-2024:6568 | Red Hat Security Advisory: redhat-ds:11 security and bug fix update | 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:directory_server:11.9::el8"
]
| null | 5.7 | null | null |
CVE-2019-11781 | Improper input validation in portal component in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier, allows remote attackers to trick victims into modifying their account via crafted links, leading to privilege escalation. | [
"cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*"
]
| null | null | 6.5 | null |
|
GHSA-2wv3-fgjg-gj5w | Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access. | []
| null | 6.5 | null | null |
|
CVE-2015-5572 | Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.191:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.203:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.209:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.232:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-f95p-xwh9-8625 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager allows Path Traversal. This issue affects CM Download Manager: from n/a through 2.9.6. | []
| null | 8.6 | null | null |
|
GHSA-8xgp-9gxv-wph2 | Cross-site scripting (XSS) vulnerability in the Wir ber uns (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
RHSA-2024:4824 | Red Hat Security Advisory: nodejs:18 security update | nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 5.3 | null | null |
CVE-2021-3703 | It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless 1.16.0 and Serverless client kn 1.16.0. These have been fixed with Serverless 1.17.0. | [
"cpe:2.3:a:redhat:openshift_serverless:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2021-0563 | In ih264e_fmt_conv_422i_to_420sp of ih264e_fmt_conv.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-172908358 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-cc65-vj4f-xm35 | An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'. | []
| null | null | null | null |
|
GHSA-fm7f-hwmh-f544 | USB20.dll in Secustick USB flash drive decouples the authorization and file access routines, which allows local users to bypass authentication requirements by altering the return value of the VerifyPassWord function. | []
| null | null | null | null |
|
CVE-2007-2574 | Directory traversal vulnerability in index.php in Archangel Weblog 0.90.02 allows remote attackers to read arbitrary files via a .. (dot dot) in the index parameter. | [
"cpe:2.3:a:archangelmgt:weblog:0.90.02:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-22612 | An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. A malicious host OS can invoke an Insyde SMI handler with malformed arguments, resulting in memory corruption in SMM. | [
"cpe:2.3:a:insyde:insydeh2o:05.0a.11:*:*:*:*:*:*:*",
"cpe:2.3:a:insyde:insydeh2o:05.18.03:*:*:*:*:*:*:*",
"cpe:2.3:a:insyde:insydeh2o:05.28.03:*:*:*:*:*:*:*",
"cpe:2.3:a:insyde:insydeh2o:05.37.03:*:*:*:*:*:*:*",
"cpe:2.3:a:insyde:insydeh2o:05.45.01:*:*:*:*:*:*:*",
"cpe:2.3:a:insyde:insydeh2o:05.53.01:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2021-40745 | Adobe Campaign Path Traversal Leads to Information Exposure | Adobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server. | [
"cpe:2.3:a:adobe:campaign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
ICSA-23-096-04 | Korenix Jetwave | Korenix JetWave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to command injection. An attacker could modify the file_name parameter to execute commands as root. CVE-2023-23294 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to command injection via /goform/formSysCmd. An attacker could modify the sysCmd parameter to execute commands as root. CVE-2023-23295 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Korenix JetWave 4200 Series 1.3.0 and JetWave 3200 Series 1.6.0 are vulnerable to a possible denial-of-service condition via /goform/formDefault. When logged in, a user could issue a POST request so that the underlying binary exits. The web-service then becomes unavailable and cannot be accessed until a user reboots the device. CVE-2023-23296 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | 6.5 | null |
GHSA-698p-fq8p-q78h | Stack-based buffer overflow in the handshake function in iodine 0.3.2 allows remote attackers to execute arbitrary code via a crafted DNS response. | []
| null | null | null | null |
|
GHSA-6xmf-7cqj-2h8m | SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function. | []
| null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.