id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-30771
|
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.4, iOS 14.6 and iPadOS 14.6, watchOS 7.5, tvOS 14.6. Processing a maliciously crafted font file may lead to arbitrary code execution.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2024-47547
|
Ruijie Reyee OS Weak Password Recovery Mechanism for Forgotten Password
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks.
|
[
"cpe:2.3:o:ruijie:reyee_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*"
] | 9.3 | 9.4 | null | null |
GHSA-8fr7-p5q2-h3qh
|
Multiple cross-site scripting (XSS) vulnerabilities in HomePH Design 2.10 RC2 allow remote attackers to inject arbitrary web script or HTML via the (1) error_meldung parameter to admin/features/register/register.php, the (2) feature_language[ueberschrift] parameter to admin/features/memberlist/memberlist.php, the (3) language_array[ueberschrift] parameter to admin/features/lostpassword/lostpassword.php, the (4) language_feature[titel] parameter to admin/features/kalender/eingabe.php, and the (5) language_feature[bildmenu] parameter to admin/features/fotogalerie/eingabe.php.
|
[] | null | null | null | null |
|
RHSA-2020:2844
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.6 | null | null |
GHSA-39jx-jr53-979c
|
An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
|
[] | null | 7.5 | null | null |
|
CVE-2008-1114
|
Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
|
[
"cpe:2.3:h:vocera:wireless_handset:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-4gf4-mg8f-6224
|
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
|
[] | null | 9.8 | null | null |
|
GHSA-wqw7-xgf9-5p2q
|
In the Linux kernel, the following vulnerability has been resolved:regulator: scmi: Fix refcount leak in scmi_regulator_probeof_find_node_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
|
[] | null | 5.5 | null | null |
|
CVE-2006-4222
|
Multiple unspecified vulnerabilities in IBM WebSphere Application Server before 6.0.2.13 have unspecified vectors and impact, including (1) an "authority problem" in ThreadIdentitySupport as identified by PK25199, and "Potential security exposure" issues as identified by (2) PK22747, (3) PK24334, (4) PK25740, and (5) PK26123.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2013-3146
|
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
|
[
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-rxhh-c759-8w6x
|
A vulnerability was found in Netis WF-2404 1.1.124EN. It has been declared as critical. This vulnerability affects unknown code of the component UART. The manipulation leads to hardware allows activation of test or debug logic at runtime. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 7 | 6.8 | null | null |
|
GHSA-774c-xc8q-c8cj
|
A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11, aka 'Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability'.
|
[] | null | 7.3 | null | null |
|
GHSA-57wx-64w4-pwjp
|
A vulnerability classified as problematic has been found in heyewei SpringBootCMS up to 2024-05-28. Affected is an unknown function of the file /guestbook of the component Guestbook Handler. The manipulation of the argument Content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-270450 is the identifier assigned to this vulnerability.
|
[] | 5.3 | 3.5 | null | null |
|
CVE-2024-7711
|
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server, allowing an attacker to update the title, assignees, and labels of any issue inside a public repository. This was only exploitable inside a public repository. This vulnerability affected GitHub Enterprise Server versions before 3.14 and was fixed in versions 3.13.3, 3.12.8, and 3.11.14. Versions 3.10 of GitHub Enterprise Server are not affected. This vulnerability was reported via the GitHub Bug Bounty program.
|
[
"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*"
] | 5.3 | null | null | null |
|
GHSA-2x27-jcrc-gj3p
|
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8422.
|
[] | null | null | 6.5 | null |
|
RHSA-2024:5858
|
Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
|
[
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.1 | null | null |
GHSA-8cm5-g2j6-fh65
|
Adobe Lightroom versions 4.4 (and earlier) are affected by a use-after-free vulnerability in the processing of parsing TIF files that could result in privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 3.3 | null | null |
|
GHSA-65vg-64g8-mwjr
|
Apache Seata Vulnerable to Data Amplification
|
Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Apache Seata (incubating).This issue affects Apache Seata (incubating): through <=2.2.0.Users are recommended to upgrade to version 2.3.0, which fixes the issue.
|
[] | 2.7 | 4.3 | null | null |
GHSA-437m-7hj5-9mpw
|
Kruise allows leveraging the kruise-daemon pod to list all secrets in the entire cluster
|
ImpactAttacker that has gain root privilege of the node that kruise-daemon run , can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, attackers can leverage the "captured" secrets (e.g. the kruise-manager service account token) to gain extra privilege such as pod modification.WorkaroundsFor users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilegePatchesFor users who're using v0.8.x ~ v1.2.x, please update the v1.3.1
For users who're using v1.3, please update the v1.3.1
For users who're using v1.4, please update the v1.4.1
For users who're using v1.5, please update the v1.5.2ReferencesNone
|
[] | null | 6.5 | null | null |
CVE-2024-32781
|
WordPress Email Customizer for WooCommerce plugin <= 2.6.0 - Sensitive Data Exposure vulnerability
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeHigh Email Customizer for WooCommerce.This issue affects Email Customizer for WooCommerce: from n/a through 2.6.0.
|
[
"cpe:2.3:a:wordpress:email_customizer_for_woocommerce:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-6698-mhxx-r84g
|
Ursa CL-Signatures Revocation allows verifiers to generate unique identifiers for holders
|
SummaryThe revocation scheme that is part of the Ursa CL-Signatures implementations has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model. Notably, a malicious verifier may be able to generate a unique identifier for a holder providing a verifiable presentation that includes a Non-Revocation proof.DetailsThe revocation scheme that is part of the Ursa CL-Signatures implementations has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model, potentially allowing a malicious verifier to generate a unique identifier for a holder that provides a verifiable presentation that includes a Non-Revocation proof.The flaws affects all CL-Signature versions published from the [Hyperledger Ursa] repository to the [Ursa Rust Crate], and is fixed in all versions published from the [Hyperledger AnonCreds CL-Signatures] repository to the [AnonCreds CL-Signatures Rust Crate].The addressing the flaw requires updating AnonCreds holder software (such as mobile wallets) to a corrected CL-Signature implementation, such as the [AnonCreds CL Signatures Rust Crate]. Verifying presentations from corrected holders requires a updating the verifier software to a corrected CL-Signatures implementation. An updated verifier based on AnonCreds CL-Signatures can verify presentations from holders built on either the flawed Ursa CL-Signature implementation or a corrected CL-Signature implementationThe flaw occurs as a result of generating a verifiable presentation that includes a Non-Revocation proof from a flawed implementation.ImpactThe impact of the flaw is that a malicious verifier may be able to determine a unique identifier for a holder presenting a Non-Revocation proof.MitigationUpgrade libraries/holder applications that generate AnonCreds verifiable presentations using the [Ursa Rust Crate] to any version of the [AnonCreds CL-Signatures Rust Crate].
|
[] | null | 6.5 | null | null |
GHSA-8m3h-2pfc-jv58
|
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Fix a couple integer overflows on 32bit systemsOn 32bit systems the "off + sizeof(struct NTFS_DE)" addition can
have an integer wrapping issue. Fix it by using size_add().
|
[] | null | 5.5 | null | null |
|
CVE-2016-7209
|
Microsoft Edge allows remote attackers to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.6 |
|
GHSA-244j-xp9p-xr45
|
IBM Security Guardium Insights 3.0 could allow an authenticated user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 205256.
|
[] | null | 2.7 | null | null |
|
GHSA-xx9j-qj8x-mmv5
|
The Packet Data Network Gateway (aka PGW) component on Cisco ASR 5000 devices with software 18.0.0.59167 and 18.0.0.59211 allows remote attackers to cause a denial of service via a malformed header in a GTPv2 packet, aka Bug ID CSCut11534.
|
[] | null | null | null | null |
|
GHSA-p72h-2892-8mjc
|
GnuTLS incorrectly validates the first byte of padding in CBC modes
|
[] | null | 5.9 | null | null |
|
CVE-2008-3399
|
PHP remote file inclusion vulnerability in activities/workflow-activities.php in XRMS CRM 1.99.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the include_directory parameter.
|
[
"cpe:2.3:a:xrms:xrms_crm:1.99.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-mmr7-4p3g-gvjm
|
Files or Directories Accessible to External Parties in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows authenticated user to redirect DLPe log files to arbitrary locations via incorrect access control applied to the DLPe log folder allowing privileged users to create symbolic links.
|
[] | null | null | null | null |
|
CVE-2023-46420
|
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function.
|
[
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-q664-xxjg-cm3g
|
On Juniper ATP, the API key and the device key are logged in a file readable by authenticated local users. These keys are used for performing critical operations on the WebUI interface. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
|
[] | null | 5.5 | null | null |
|
CVE-2019-1587
|
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability
|
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, remote attacker to access sensitive information. The vulnerability occurs because the affected software does not properly validate user-supplied input. An attacker could exploit this vulnerability by issuing certain commands with filtered query results on the device. This action may cause returned messages to display confidential system information. A successful exploit could allow the attacker to read sensitive information on the device.
|
[
"cpe:2.3:o:cisco:nx-os:8.3\\(0\\)sk\\(0.39\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
GHSA-5676-7fp6-4h94
|
nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().
|
[] | null | 9.8 | null | null |
|
GHSA-2rgh-6pcq-8cq4
|
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the currentRequest parameter.
|
[] | null | 5.4 | null | null |
|
GHSA-xpj8-p66v-3v8x
|
plugins/box/users/users.plugin.php in Monstra CMS 3.0.4 allows Login Rate Limiting Bypass via manipulation of the login_attempts cookie.
|
[] | null | null | 9.8 | null |
|
GHSA-r5vg-678j-p7m4
|
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
|
[] | null | 7.5 | null | null |
|
CVE-2021-1297
|
Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers Arbitrary File Write Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.
|
[
"cpe:2.3:o:cisco:rv160w_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv160w_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv260_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv260_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv260p_vpn_router_with_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv260p_vpn_router_with_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv260w_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv260w_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv160_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv160_vpn_router:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2023-42913
|
This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2021-46895
|
Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2010-2299
|
The Clipboard::DispatchObject function in app/clipboard/clipboard.cc in Google Chrome before 5.0.375.70 does not properly handle CBF_SMBITMAP objects in a ViewHostMsg_ClipboardWriteObjectsAsync message, which might allow remote attackers to execute arbitrary code via vectors involving crafted data from the renderer process, related to a "Type Confusion" issue.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-xgp8-x9mp-9656
|
PHP remote file inclusion vulnerability in example/gamedemo/inc.functions.php in PHP Comet-Server allows remote attackers to execute arbitrary PHP code via a URL in the projectPath parameter.
|
[] | null | null | null | null |
|
CVE-2020-0039
|
In rw_i93_sm_update_ndef of rw_i93.cc, there is a possible read of uninitialized data due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143155861
|
[
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2025-0106
|
Expedition: Wildcard Expansion Vulnerability
|
A wildcard expansion vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to enumerate files on the host filesystem.
|
[] | 6.9 | null | null | null |
GHSA-rwcc-rgpq-6qv7
|
Server-Side Request Forgery (SSRF) in GitHub repository salesagility/suitecrm prior to 7.14.2, 8.4.2, 7.12.14.
|
[] | null | null | 5 | null |
|
CVE-2018-10769
|
The transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).
|
[
"cpe:2.3:a:smartmesh_project:smartmesh:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ugtoken_project:ugtoken:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gg_token_project:gg_token:-:*:*:*:*:*:*:*",
"cpe:2.3:a:first_project:first:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mtc_project:mtc:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mesh_project:mesh:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2014-7585
|
The Biplane Forum (aka com.gcspublishing.biplaneforum) application 3.7.14 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:gcspublishing:biplane_forum:3.7.14:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-8gfm-hxfq-gm8r
|
SQL injection vulnerability in agenda/indexdate.php in DomPHP 0.83 and earlier allows remote attackers to execute arbitrary SQL commands via the ids parameter.
|
[] | null | null | null | null |
|
CVE-2023-42451
|
Mastodon Invalid Domain Name Normalization vulnerability
|
Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 3.5.14, 4.0.10, 4.1.8, and 4.2.0-rc2, under certain circumstances, attackers can exploit a flaw in domain name normalization to spoof domains they do not own. Versions 3.5.14, 4.0.10, 4.1.8, and 4.2.0-rc2 contain a patch for this issue.
|
[
"cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joinmastodon:mastodon:4.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joinmastodon:mastodon:4.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joinmastodon:mastodon:4.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joinmastodon:mastodon:4.2.0:rc1:*:*:*:*:*:*"
] | null | 7.4 | null | null |
GHSA-w5w5-3f25-r899
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
|
[] | null | 9.8 | null | null |
|
GHSA-qpjg-w2cf-62fm
|
Speco Web Viewer through 2021-05-12 allows Directory Traversal via GET request for a URI with /.. at the beginning, as demonstrated by reading the /etc/passwd file.
|
[] | null | null | null | null |
|
CVE-2016-10838
|
cPanel before 11.54.0.4 allows arbitrary file-read operations via the bin/fmq script (SEC-70).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 |
|
CVE-2001-0489
|
Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands.
|
[
"cpe:2.3:a:gftp:gftp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-5xj2-h84j-jqmg
|
The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data.
|
[] | null | null | null | null |
|
GHSA-6pvx-mxmx-6c69
|
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.
|
[] | null | null | 5.5 | null |
|
GHSA-c9vv-fhgv-cjc3
|
agent-js: Insecure Key Generation in `Ed25519KeyIdentity.generate`
|
ImpactThe library offers a function to generate an ed25519 key pair via `Ed25519KeyIdentity.generate` with an optional param to provide a 32 byte seed value, which will then be used as the secret key. **When no seed value is provided, it is expected that the library generates the secret key using secure randomness**. However, a recent change **broke this guarantee** and **uses an insecure seed for key pair generation**.Since the private key of this identity (`535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe`) is compromised, one could lose funds associated with the principal on ledgers or lose access to a canister where this principal is the controller. Users are asked to take proactive measures mentioned below in Workarounds:Users to protect their assets.PatchesPatch for the vulnerability is **available in v1.0.1** for all the packages listed in the advisory. Please upgrade and deploy your canisters immediately.WorkaroundsDevelopersThe recommended fix is to upgrade the package to the patched version. If that is not possible, there are couple of workarounds to handle the insecure key generation.Invoking the function as `Ed25519KeyIdentity.generate(null)` would fix the broken conditional evaluation and force the function to generate a securely random seed. However, this is not guaranteed to work for future upgrades.Passing a securely generated randomness as a seed to `Ed25519KeyIdentity.generate` would force the library to use it as the seed to generate the key pair.UsersRemoving a controller of a canister if it's the affected principalFor all canisters you control, fetch the controllers of the canisters usingIf you see the principal `535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe` as one of the controllers, follow the steps belowFor more details on canister management, please visit [here](https://internetcomputer.org/docs/current/tutorials/developer-journey/level-1/1.6-managing-canisters)Checking funds on wallets / ledgersIf you have funds on ledgers using a browser wallet, please check if the account principal matches `535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe`. If it does, please create a new account and transfer the funds to the new account immediately.References[fix PR link](https://github.com/dfinity/agent-js/pull/851)[NPM patched version](https://www.npmjs.com/package/@dfinity/identity/v/1.0.1)[agent-js Github repo](https://github.com/dfinity/agent-js)[agent-js docs](https://agent-js.icp.xyz/identity/index.html)
|
[] | null | 9.1 | null | null |
GHSA-vj2q-j7r5-rxmc
|
A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.
|
[] | null | 4.6 | null | null |
|
GHSA-8cj9-48f5-cw6r
|
In wpa_supplicant_8, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122529021
|
[] | null | 7.5 | null | null |
|
GHSA-569f-2ggr-6v5w
|
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
|
[] | null | 6.7 | null | null |
|
CVE-2014-1406
|
CRLF injection vulnerability in goform/formWlSiteSurvey on the Conceptronic C54APM access point with runtime code 1.26 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the submit-url parameter in a Refresh action.
|
[
"cpe:2.3:o:conceptronic:c54apm_firmware:1.26:*:*:*:*:*:*:*",
"cpe:2.3:h:conceptronic:c54apm:v2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-26941
|
Format string vulnerability in AT+CTGL command in Motorola MTM5000
|
A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges.
|
[
"cpe:2.3:a:motorola:mobile_radio:*:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
CVE-2008-6282
|
SQL injection vulnerability in engine/users/users_edit_pub.inc in CMS Ortus 1.13 and earlier allows remote authenticated users to execute arbitrary SQL commands via the city parameter in a users_edit_pub action to index.php.
|
[
"cpe:2.3:a:ortus.nirn:cms_ortus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ortus.nirn:cms_ortus:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ortus.nirn:cms_ortus:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ortus.nirn:cms_ortus:1.12:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-q456-x2hr-h7jw
|
In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0.
|
[] | null | 8.8 | null | null |
|
CVE-2005-0091
|
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
|
[
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2024:0573
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
GHSA-9ghc-5v2p-hqcg
|
Tenda AX3 v16.03.12.10_CN was discovered to contain a command injection vulnerability in the function formSetSafeWanWebMan. This vulnerability allows attackers to execute arbitrary commands via the remoteIp parameter.
|
[] | null | null | null | null |
|
GHSA-wxm5-2gcr-wvxp
|
PHP remote file inclusion vulnerability in include/database.php in SourceForge (aka alexandria) 1.0.4 allows remote attackers to execute arbitrary PHP code via the sys_dbtype parameter.
|
[] | null | null | null | null |
|
CVE-2018-8450
|
A remote code execution vulnerability exists when Windows Search handles objects in memory, aka "Windows Search Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-3564-6m3q-363h
|
Adobe Digital Editions 4.5.4 and earlier has an exploitable heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.5 | null |
|
CVE-2009-3227
|
Cross-site scripting (XSS) vulnerability in index.php in AlmondSoft Almond Classifieds Ads Enterprise and Almond Affiliate Network Classifieds allows remote attackers to inject arbitrary web script or HTML via the city parameter in a search action. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:almondsoft:affiliate_network_classifieds:*:*:*:*:*:*:*:*",
"cpe:2.3:a:almondsoft:almond_classifieds:*:*:enterprise:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2015-4649
|
Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated administrators to gain root privileges via unspecified vectors, a different vulnerability than CVE-2015-3654.
|
[
"cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass:6.5.1:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
GHSA-5ccr-3j65-pj6m
|
ikiwiki before 3.20110608 allows remote attackers to hijack root's tty and run symlink attacks.
|
[] | null | null | null | null |
|
CVE-2014-5452
|
CDA.xsl in HL7 C-CDA 1.1 and earlier does not anticipate the possibility of invalid C-CDA documents with crafted XML attributes, which allows remote attackers to conduct XSS attacks via a document containing a table that is improperly handled during unrestricted xsl:copy operations.
|
[
"cpe:2.3:a:hl7:c-cda:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cq7j-cjrf-2r4m
|
pam_google_authenticator.c in the PAM module in Google Authenticator before 1.0 requires user-readable permissions for the secret file, which allows local users to bypass intended access restrictions and discover a shared secret via standard filesystem operations, a different vulnerability than CVE-2013-0258.
|
[] | null | null | null | null |
|
CVE-2024-47374
|
WordPress LiteSpeed Cache plugin <= 6.5.0.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 6.5.0.2.
|
[] | null | 7.1 | null | null |
CVE-2019-0767
|
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.To exploit this vulnerability, an authenticated attacker could run a specially crafted application, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0702, CVE-2019-0755, CVE-2019-0775, CVE-2019-0782.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2006-0542
|
Multiple SQL injection vulnerabilities in config.php in NukedWeb GuestBookHost 2005.04.25 allow remote attackers to execute arbitrary SQL commands via the (1) email and (2) password parameters.
|
[
"cpe:2.3:a:nukedweb:guestbookhost:2005-04-25:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p3ph-6245-4wfc
|
Cross-site Scripting in JFinalcms
|
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).
|
[] | null | 5.4 | null | null |
GHSA-pcv2-79g6-vcp8
|
CloudView NMS before 2.10a has XSS via a TELNET login.
|
[] | null | null | 6.1 | null |
|
CVE-2024-53727
|
WordPress LinkLaunder SEO plugin <= 0.92.1 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in LinkLaunder.com LinkLaunder SEO allows Stored XSS.This issue affects LinkLaunder SEO: from n/a through 0.92.1.
|
[] | null | 7.1 | null | null |
GHSA-xq55-4x3m-2f97
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of NEF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11192.
|
[] | null | null | null | null |
|
CVE-2017-2494
|
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-79f8-5j4j-fpx5
|
Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption).
|
[] | null | null | 7.5 | null |
|
GHSA-ppvx-gqx9-qrq3
|
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 5.2.12 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers spoof their IP address and submit forms that may have IP-based restrictions.
|
[] | null | 5.3 | null | null |
|
GHSA-6g54-r3q8-8jvq
|
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
|
[] | null | null | null | null |
|
GHSA-wmm8-4p47-889q
|
Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
|
[] | null | null | null | null |
|
RHSA-2024:2764
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing undertow: directory traversal vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 5.3 | null | null |
CVE-2023-2572
|
Survey Maker < 3.4.7 - Reflected XSS
|
The Survey Maker WordPress plugin before 3.4.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[
"cpe:2.3:a:ays-pro:survey_maker:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
GHSA-gc9m-33cp-rmpj
|
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
|
[] | null | 7.5 | null | null |
|
GHSA-8fxq-mgg4-pxg6
|
Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements
|
[] | null | 6.5 | null | null |
|
GHSA-rw6f-wgvq-rrvg
|
A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
|
[] | null | 6.1 | null | null |
|
CVE-2022-24140
|
IOBit Advanced System Care 15, iTop Screen Recorder 2.1, iTop VPN 3.2, Driver Booster 9, and iTop Screenshot sends HTTP requests in their update procedure in order to download a config file. After downloading the config file, the products will parse the HTTP location of the update from the file and will try to install the update automatically with ADMIN privileges. An attacker Intercepting this communication can supply the product a fake config file with malicious locations for the updates thus gaining a remote code execution on an endpoint.
|
[
"cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:free:*:*:*",
"cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:pro:*:*:*",
"cpe:2.3:a:iobit:driver_booster:9:*:*:*:*:*:*:*",
"cpe:2.3:a:iobit:itop_screen_recorder:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iobit:itop_screenshot:-:*:*:*:*:*:*:*",
"cpe:2.3:a:iobit:itop_vpn:3.2:*:*:*:*:*:*:*"
] | null | 6.6 | null | 6 |
|
CVE-2018-10931
|
It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
|
[
"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
GHSA-vc8j-4787-938h
|
In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
|
[] | null | null | 6.5 | null |
|
GHSA-p8p7-7fm4-2f46
|
Opera 8.01 allows remote attackers to conduct cross-site scripting (XSS) attacks or modify which files are uploaded by tricking a user into dragging an image that is a "javascript:" URI.
|
[] | null | null | null | null |
|
GHSA-6x5p-xjc6-8vpw
|
M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted "rule definitions", which produces dangerous Java code during M4 transformation.
|
[] | null | null | null | null |
|
RHSA-2017:1201
|
Red Hat Security Advisory: thunderbird security update
|
libevent: Stack-buffer overflow in the name_parse() function libevent: Stack-buffer overflow in evutil_parse_sockaddr_port() libevent: Out-of-bounds read in search_make_new() Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12) Mozilla: Addressbar spoofing with onblur event (MFSA 2017-12) Mozilla: Sandbox escape allowing file system read access through file picker (MFSA 2017-12) Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12) Mozilla: Origin confusion when reloading isolated data:text/html URL (MFSA 2017-12) Mozilla: Memory corruption when drawing Skia content (MFSA 2017-12) Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
CVE-2005-0813
|
Buffer overflow in Initial Redirect (ir) Squid Proxy Plug-In 0.1 and 0.2 may allow attackers to cause a denial of service and execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:initial_redirect:initial_redirect_squid_proxy_plug-in:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:initial_redirect:initial_redirect_squid_proxy_plug-in:0.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-p368-mj9g-r3mh
|
External Entity Processing (XXE) vulnerability in the "risk score" application of NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be used to disclose the content of local files to logged-in users.
|
[] | null | null | 5.5 | null |
|
CVE-2007-3793
|
SQL injection vulnerability in Job Management Partner 1/NETM/DM (JP1/NETM/DM) Manager on Windows before 20070413 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:03-00:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:05-24-e\\(\\*1\\):*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:06-00:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:06-72-g:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:07-00:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:07-50:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:07-53-09:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:08-00:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:08-02-01:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1-netm-dm_manager:*:08-10:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-jv4m-hqrr-pvp9
|
PHP remote file inclusion vulnerability in kernel/system/startup.php in J. He PHPGiggle 12.08 and earlier, as distributed on comscripts.com, allows remote attackers to execute arbitrary PHP code via a URL in the CFG_PHPGIGGLE_ROOT parameter.
|
[] | null | null | null | null |
|
CVE-2014-2264
|
The OpenVPN module in Synology DiskStation Manager (DSM) 4.3-3810 update 1 has a hardcoded root password of synopass, which makes it easier for remote attackers to obtain access via a VPN session.
|
[
"cpe:2.3:a:synology:diskstation_manager:4.3-3810:1:*:*:*:*:*:*"
] | null | null | null | 7.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.