id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-453c-hx6c-v5gq
|
IBM Cloud App Management 2019.3.0 and 2019.4.0 reveals a stack trace on certain API requests which can allow an attacker further information about the implementation of the offering. IBM X-Force ID: 173311.
|
[] | null | null | null | null |
|
GHSA-89qq-xm3r-9xgv
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format actions of TextBox objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5571.
|
[] | null | null | 8.8 | null |
|
GHSA-9m4h-w5f9-qjgv
|
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.
|
[] | null | 6.5 | null | null |
|
GHSA-5575-w787-j9qq
|
SQL injection vulnerability in the CMSJunkie J-ClassifiedsManager component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a viewad task to classifieds/offerring-ads.
|
[] | null | null | null | null |
|
CVE-2024-35265
|
Windows Perception Service Elevation of Privilege Vulnerability
|
Windows Perception Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"
] | null | 7 | null | null |
CVE-2022-39326
|
kartverket/github-workflows's run-terraform allows for RCE via terraform plan
|
kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.
|
[
"cpe:2.3:a:kartverket:github-workflows:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2012-0856
|
Heap-based buffer overflow in the MPV_frame_start function in libavcodec/mpegvideo.c in FFmpeg before 0.9.1, when the lowres option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted H263 media file. NOTE: this vulnerability exists because of a regression error.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-4fxg-w3g2-qr6r
|
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
|
[] | null | null | 7.5 | null |
|
CVE-2015-5945
|
The Sandbox subsystem in Apple OS X before 10.11.1 allows local users to gain privileges via vectors involving NVRAM parameters.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-pm3v-cfmp-f7x4
|
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
|
[] | null | null | 6.1 | null |
|
GHSA-6396-m98j-2qhj
|
A vulnerability has been found in obsproject OBS Studio up to 30.0.2 on Windows and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. The vendor disagrees that this issue is "something worth reporting, as every attack surface requires privileged access/user compromise".
|
[] | 2 | 4.5 | null | null |
|
GHSA-jpr6-88j2-72pf
|
The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.
|
[] | null | 5.4 | null | null |
|
CVE-2020-10275
|
RVD#2565: Weak token generation for the REST API.
|
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
|
[
"cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
GHSA-chrc-q6v3-jfv8
|
Liferay Portal has Inefficient Regular Expression
|
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.
|
[] | null | 6.5 | null | null |
RHSA-2012:0301
|
Red Hat Security Advisory: ImageMagick security and bug fix update
|
ImageMagick: configuration files read from $CWD may allow arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2023-48626
|
Adobe Substance 3D Sampler v4.2.1Build3527 OOBW Vulnerability V
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2021-46446
|
H.H.G Multistore v5.1.0 and below was discovered to contain a SQL injection vulnerability via /admin/admin.php?module=admin_access_group_edit&aagID.
|
[
"cpe:2.3:a:hhg-multistore:multistore:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hhg-multistore:multistore:4.10.3:*:*:*:community:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-29339
|
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
|
[
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-57hp-xp39-9m3w
|
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited.
|
[] | null | 8.7 | null | null |
|
GHSA-6rj9-p8fm-j3vm
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[] | null | null | null | null |
|
GHSA-mjf6-gmwv-grxx
|
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
|
[] | null | 4.7 | null | null |
|
CVE-2021-32956
|
Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to redirection, which may allow an attacker to send a maliciously crafted URL that could result in redirecting a user to a malicious webpage.
|
[
"cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2014-4338
|
cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
|
[
"cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2024-31219
|
Discourse-reactions' reaction data and public topic whisper content exposed on reactions given user activity page
|
Discourse-reactions is a plugin that allows user to add their reactions to the post. When whispers are enabled on a site via `whispers_allowed_groups` and reactions are made on whispers on public topics, the contents of the whisper and the reaction data are shown on the `/u/:username/activity/reactions` endpoint.
|
[] | null | 4.3 | null | null |
GHSA-j4pw-hgvj-fq4w
|
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
|
[] | null | null | 5.5 | null |
|
CVE-2020-4513
|
IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182368.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p2:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-ccrj-63hr-x5gh
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null |
|
GHSA-v8rc-qj98-2pv7
|
Weak encryption mechanisms in RFID Tags in Yale IA-210 Alarm v1.0 allows attackers to create a cloned tag via physical proximity to the original.
|
[] | null | 6.5 | null | null |
|
CVE-2020-27587
|
Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password.
|
[
"cpe:2.3:a:quickheal:total_security:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 2.1 |
|
RHSA-2021:0706
|
Red Hat Security Advisory: container-tools:2.0 security update
|
golang: math/big: panic during recursive division of very large numbers podman: container users permissions are not respected in privileged containers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2024:1874
|
Red Hat Security Advisory: rhc-worker-script security and enhancement update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | null | null |
CVE-2024-52877
|
An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, callback function SmmCreateVariableLockList () calls CreateVariableLockListInSmm (). In CreateVariableLockListInSmm (), it uses StrSize () to get variable name size and it could lead to a buffer over-read.
|
[] | null | 7.5 | null | null |
|
GHSA-2xvc-p88c-94vw
|
SAP UI5 Variant Management - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200, does not sufficiently encode user-controlled inputs on reading data from the server, resulting in Stored Cross-Site Scripting (Stored XSS) vulnerability. After successful exploitation, an attacker with user level access can cause high impact on confidentiality, modify some information and can cause unavailability of the application at user level.
|
[] | null | 8.2 | null | null |
|
CVE-2018-10408
|
An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
|
[
"cpe:2.3:a:virustotal:virustotal:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2018-8170
|
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory, aka "Windows Image Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
|
[
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*"
] | null | null | 7 | 4.4 |
|
GHSA-46m8-42hm-wvvw
|
Cross-Site Scripting in emojione
|
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.RecommendationUpdate to version 1.3.1 or later.
|
[] | null | null | null | null |
CVE-2025-4837
|
projectworlds Student Project Allocation System make_group_sql.php sql injection
|
A vulnerability classified as critical has been found in projectworlds Student Project Allocation System 1.0. This affects an unknown part of the file /make_group_sql.php. The manipulation of the argument mem1/mem2/mem3 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2018-8518
|
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8480, CVE-2018-8488, CVE-2018-8498.
|
[
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-g93h-75m9-3qq4
|
pngcrush-installer downloads Resources over HTTP
|
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`.RecommendationUpdate to version 1.8.10 or later.
|
[] | null | null | 8.1 | null |
CVE-2024-3072
|
The ACF Front End Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_texts() function in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary post title, content, and ACF data.
|
[] | null | 4.3 | null | null |
|
GHSA-943h-97rc-v23r
|
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, watchOS 9.5. An app may be able to access user-sensitive data.
|
[] | null | 5.5 | null | null |
|
GHSA-rf7c-xh3f-99v4
|
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.6, macOS Monterey 12.3, Security Update 2022-004 Catalina. A remote user may cause an unexpected app termination or arbitrary code execution
|
[] | null | 9.8 | null | null |
|
GHSA-mpxv-mc7c-75m5
|
Buffer overflow in Resco Photo Viewer for PocketPC 4.11 and 6.01, as used in mobile devices running Windows Mobile 5.0, 2003, and 2003SE, allows remote attackers to execute arbitrary code via a crafted PNG image.
|
[] | null | null | null | null |
|
GHSA-496p-8p53-pf9q
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FS Poster allows Reflected XSS. This issue affects FS Poster: from n/a through 6.5.8.
|
[] | null | 7.1 | null | null |
|
GHSA-hc96-wp9w-2cq9
|
Unspecified vulnerability in the Finder Get Info window for Mac OS X 10.4 up to 10.4.2 causes Finder to misrepresent file and group ownership information. NOTE: it is not clear whether this issue satisfies the CVE definition of a vulnerability.
|
[] | null | null | null | null |
|
GHSA-hm4p-g93x-crgm
|
The unofficial GLSL Linting extension before 1.4.0 for Visual Studio Code allows remote code execution via a crafted glslangValidatorPath in the workspace configuration.
|
[] | null | 9.8 | null | null |
|
CVE-2024-5066
|
PHPGurukul Online Course Registration System pincode-verification.php sql injection
|
A vulnerability classified as critical was found in PHPGurukul Online Course Registration System 3.1. Affected by this vulnerability is an unknown functionality of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264925 was assigned to this vulnerability.
|
[
"cpe:2.3:a:phpgurukul:online_course_registration_system:3.1:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
cisco-sa-20170726-anicrl
|
Cisco IOS XE Software Autonomic Networking Infrastructure Certificate Revocation Vulnerability
|
A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked.
The vulnerability exists because the affected software does not transfer certificate revocation lists (CRLs) across Autonomic Control Plane (ACP) channels. An attacker could exploit this vulnerability by connecting an autonomic node, which has a known and revoked certificate, to the autonomic domain of an affected system. A successful exploit could allow the attacker to insert a previously trusted autonomic node into the autonomic domain of an affected system after the certificate for the node has been revoked.
There are no workarounds that address this vulnerability.
|
[] | null | null | 6.5 | null |
CVE-2023-49773
|
WordPress BCorp Shortcodes Plugin <= 0.23 is vulnerable to PHP Object Injection
|
Deserialization of Untrusted Data vulnerability in Tim Brattberg BCorp Shortcodes.This issue affects BCorp Shortcodes: from n/a through 0.23.
|
[
"cpe:2.3:a:bcorp_shortcodes_project:bcorp_shortcodes:*:*:*:*:*:wordpress:*:*"
] | null | 10 | null | null |
CVE-2014-2516
|
Open redirect vulnerability in EMC RSA Authentication Manager 8.x before 8.1 Patch 6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[
"cpe:2.3:a:emc:rsa_authentication_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_authentication_manager:8.1:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-fpxq-w7p9-r924
|
Arbitrary file read vulnerability in Jenkins kubernetes-cd Plugin
|
Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.
|
[] | null | 6.5 | null | null |
ICSA-20-273-02
|
Yokogawa WideField3
|
A buffer overflow could be caused when a user loads a maliciously crafted project file.CVE-2020-16232 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).
|
[] | null | null | 2.8 | null |
CVE-2018-1000556
|
WordPress version 4.8 + contains a Cross Site Scripting (XSS) vulnerability in plugins.php or core wordpress on delete function that can result in An attacker can perform client side attacks which could be from stealing a cookie to code injection. This attack appear to be exploitable via an attacker must craft an URL with payload and send to the user. Victim need to open the link to be affected by reflected XSS. .
|
[
"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2021-22243
|
Under specialized conditions, GitLab CE/EE versions starting 7.10 may allow existing GitLab users to use an invite URL meant for another email address to gain access into a group.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5 | null | null |
|
CVE-2008-3401
|
PHP remote file inclusion vulnerability in hioxRandomAd.php in HIOX Random Ad (HRA) 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the hm parameter.
|
[
"cpe:2.3:a:hscripts:hiox_random_ad:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2006-3325
|
client/cl_parse.c in the id3 Quake 3 Engine 1.32c and the Icculus Quake 3 Engine (ioquake3) revision 810 and earlier allows remote malicious servers to overwrite arbitrary write-protected cvars variables on the client, such as cl_allowdownload for Automatic Downloading and fs_homepath for the quake3 path, via a string of cvar names and values sent from the server. NOTE: this can be combined with another vulnerability to overwrite arbitrary files.
|
[
"cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:1.32b:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:1.32c:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_803:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_804:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_805:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_806:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_807:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_808:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_809:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_810:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7qxp-rcgw-7whv
|
The NVIDIA driver in the Graphics Drivers subsystem in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[] | null | null | 9.8 | null |
|
GHSA-j2cc-c3x7-54xh
|
In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system.
|
[] | null | null | null | null |
|
CVE-2024-26120
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
CVE-2016-2232
|
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
|
[
"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2013-5096
|
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804.
|
[
"cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space_virtual_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-3cf2-6pj6-x5w3
|
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
|
[] | null | null | null | null |
|
GHSA-6g7j-q2fm-9g6r
|
Windows MSHTML Platform Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null |
|
CVE-2023-0044
|
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
|
[
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-r7r2-m3vr-c8qc
|
Mattermost Fails to Validate Team Invite Permissions
|
Mattermost versions 10.6.x <= 10.6.1, 10.5.x <= 10.5.2, 10.4.x <= 10.4.4, 9.11.x <= 9.11.11 fail to check the correct permissions which allows authenticated users who only have permission to invite non-guest users to a team to add guest users to that team via the API to add a single user to a team.
|
[] | null | 4.3 | null | null |
GHSA-4jr8-gq3p-6jg6
|
Directory traversal vulnerability in thumb.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null |
|
CVE-2007-6465
|
Multiple cross-site scripting (XSS) vulnerabilities in ganglia-web in Ganglia before 3.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) c and (2) h parameters to (a) web/host_gmetrics.php; the (3) G, (4) me, (5) x, (6) n, (7) v, (8) l, (9) vl, and (10) st parameters to (b) web/graph.php; and the (11) c, (12) G, (13) h, (14) r, (15) m, (16) s, (17) cr, (18) hc, (19) sh, (20) p, (21) t, (22) jr, (23) js, (24) gw, (25) z, and (26) gs parameters to (c) web/get_context.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:ganglia:ganglia:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-46981
|
nbd: Fix NULL pointer in flush_workqueue
|
In the Linux kernel, the following vulnerability has been resolved:
nbd: Fix NULL pointer in flush_workqueue
Open /dev/nbdX first, the config_refs will be 1 and
the pointers in nbd_device are still null. Disconnect
/dev/nbdX, then reference a null recv_workq. The
protection by config_refs in nbd_genl_disconnect is useless.
[ 656.366194] BUG: kernel NULL pointer dereference, address: 0000000000000020
[ 656.368943] #PF: supervisor write access in kernel mode
[ 656.369844] #PF: error_code(0x0002) - not-present page
[ 656.370717] PGD 10cc87067 P4D 10cc87067 PUD 1074b4067 PMD 0
[ 656.371693] Oops: 0002 [#1] SMP
[ 656.372242] CPU: 5 PID: 7977 Comm: nbd-client Not tainted 5.11.0-rc5-00040-g76c057c84d28 #1
[ 656.373661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
[ 656.375904] RIP: 0010:mutex_lock+0x29/0x60
[ 656.376627] Code: 00 0f 1f 44 00 00 55 48 89 fd 48 83 05 6f d7 fe 08 01 e8 7a c3 ff ff 48 83 05 6a d7 fe 08 01 31 c0 65 48 8b 14 25 00 6d 01 00 <f0> 48 0f b1 55 d
[ 656.378934] RSP: 0018:ffffc900005eb9b0 EFLAGS: 00010246
[ 656.379350] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 656.379915] RDX: ffff888104cf2600 RSI: ffffffffaae8f452 RDI: 0000000000000020
[ 656.380473] RBP: 0000000000000020 R08: 0000000000000000 R09: ffff88813bd6b318
[ 656.381039] R10: 00000000000000c7 R11: fefefefefefefeff R12: ffff888102710b40
[ 656.381599] R13: ffffc900005eb9e0 R14: ffffffffb2930680 R15: ffff88810770ef00
[ 656.382166] FS: 00007fdf117ebb40(0000) GS:ffff88813bd40000(0000) knlGS:0000000000000000
[ 656.382806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 656.383261] CR2: 0000000000000020 CR3: 0000000100c84000 CR4: 00000000000006e0
[ 656.383819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 656.384370] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 656.384927] Call Trace:
[ 656.385111] flush_workqueue+0x92/0x6c0
[ 656.385395] nbd_disconnect_and_put+0x81/0xd0
[ 656.385716] nbd_genl_disconnect+0x125/0x2a0
[ 656.386034] genl_family_rcv_msg_doit.isra.0+0x102/0x1b0
[ 656.386422] genl_rcv_msg+0xfc/0x2b0
[ 656.386685] ? nbd_ioctl+0x490/0x490
[ 656.386954] ? genl_family_rcv_msg_doit.isra.0+0x1b0/0x1b0
[ 656.387354] netlink_rcv_skb+0x62/0x180
[ 656.387638] genl_rcv+0x34/0x60
[ 656.387874] netlink_unicast+0x26d/0x590
[ 656.388162] netlink_sendmsg+0x398/0x6c0
[ 656.388451] ? netlink_rcv_skb+0x180/0x180
[ 656.388750] ____sys_sendmsg+0x1da/0x320
[ 656.389038] ? ____sys_recvmsg+0x130/0x220
[ 656.389334] ___sys_sendmsg+0x8e/0xf0
[ 656.389605] ? ___sys_recvmsg+0xa2/0xf0
[ 656.389889] ? handle_mm_fault+0x1671/0x21d0
[ 656.390201] __sys_sendmsg+0x6d/0xe0
[ 656.390464] __x64_sys_sendmsg+0x23/0x30
[ 656.390751] do_syscall_64+0x45/0x70
[ 656.391017] entry_SYSCALL_64_after_hwframe+0x44/0xa9
To fix it, just add if (nbd->recv_workq) to nbd_disconnect_and_put().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-2mcc-4f9v-m34r
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44670.
|
[] | null | 8.1 | null | null |
|
GHSA-7ch2-9f26-cf3p
|
Profile Manager in Apple OS X Server before 4.0 allows local users to discover cleartext passwords by reading a file after a (1) profile setup or (2) profile edit occurs.
|
[] | null | null | null | null |
|
CVE-2024-34149
|
In Bitcoin Core through 27.0 and Bitcoin Knots before 25.1.knots20231115, tapscript lacks a policy size limit check, a different issue than CVE-2023-50428. NOTE: some parties oppose this new limit check (for example, because they agree with the objective but disagree with the technical mechanism, or because they have a different objective).
|
[
"cpe:2.3:a:bitcoincore:bitcoin_core:0.10.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-4whm-cvqv-v84q
|
Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | null | null |
|
CVE-2024-39000
|
adolph_dudu ratio-swiper v0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
|
[
"cpe:2.3:a:adolphdudu:ratio-swiper:0.0.2:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2017-8129
|
The UMA product with software V200R001 and V300R001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. An attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges.
|
[
"cpe:2.3:a:huawei:uma:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:uma:v300r001:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-mm44-wc5p-wqhq
|
Denial of service due to reference expansion in versions earlier than 4.0
|
ImpactThe CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.PatchesThis problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.WorkaroundsSince version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).ReferencesSee the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).For more informationIf you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
|
[] | null | null | null | null |
GHSA-p34p-28jp-wfv2
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
|
[] | null | null | null | null |
|
GHSA-4jw2-24wg-vcf7
|
In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
|
[] | null | null | null | null |
|
CVE-2022-22503
|
IBM Robotic Process Automation 21.0.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 227125.
|
[
"cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:robotic_process_automation_as_a_service:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
CVE-2024-45120
|
Adobe Commerce | Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
|
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to alter a condition between the check and the use of a resource, having a low impact on integrity. Exploitation of this issue requires user interaction.
|
[
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*"
] | null | 3.1 | null | null |
CVE-2025-7530
|
Tenda FH1202 PPTPDClient fromPptpUserAdd stack-based overflow
|
A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 |
GHSA-c3f5-rvxj-625x
|
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12.
|
[] | null | 5.9 | null | null |
|
CVE-2018-5021
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-jv8c-8hrc-9f7m
|
Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.
|
[] | null | 7.5 | null | null |
|
CVE-2007-4196
|
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
|
[
"cpe:2.3:a:brian_carrier:the_slueth_kit:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-23080
|
XSSes in Special:BadgeView
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - OpenBadges Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - OpenBadges Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.
|
[] | null | 5.3 | null | null |
GHSA-rqp2-j5g9-2583
|
In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c.
|
[] | null | 6.5 | null | null |
|
CVE-2024-12893
|
Portabilis i-Educar Tipo de Usuário Page 2 cross site scripting
|
A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar up to 2.9. Affected by this issue is some unknown functionality of the file /usuarios/tipos/2 of the component Tipo de Usuário Page. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 2.4 | 2.4 | 3.3 |
GHSA-q38r-hcf4-gx69
|
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
|
[] | null | null | 3.3 | null |
|
CVE-2021-0901
|
In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05664618.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-hrp6-qx55-57p4
|
Absolute path traversal vulnerability in sendfile.php in web-cp 0.5.7, when register_globals is enabled, allows remote attackers to read arbitrary files via a full pathname in the filelocation parameter.
|
[] | null | null | null | null |
|
GHSA-7cwp-w3cq-m996
|
PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
|
[] | null | null | null | null |
|
CVE-2024-3907
|
Tenda AC500 setcfm formSetCfm stack-based overflow
|
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 |
CVE-2024-53966
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null |
RHSA-2025:9462
|
Red Hat Security Advisory: qt5-qtbase security update
|
qt5: qt6: QtCore Assertion Failure Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
CVE-2010-3875
|
The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-34148
|
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147.
|
[
"cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-54wx-2j59-x6gm
|
The eCommerce Product Catalog Plugin for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.43. This is due to missing or incorrect nonce validation on the 'customer_panel_password_reset' function. This makes it possible for unauthenticated attackers to reset the password of any administrator or customer account via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 8.8 | null | null |
|
CVE-2022-26701
|
A race condition was addressed with improved locking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.6 |
|
CVE-2024-51545
|
Username Enumeration
|
Username Enumeration vulnerabilities allow access to application level username add, delete, modify and list functions.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
|
[
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] | 9.3 | 10 | null | null |
CVE-2025-25517
|
Seacms <=13.3 is vulnerable to SQL Injection in admin_reslib.php.
|
[] | null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.