id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-f4v3-885v-g55x
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ImageRecycle ImageRecycle pdf & image compression plugin <= 3.1.11 versions.
|
[] | null | 7.1 | null | null | null |
|
CVE-2020-6781
|
Improper Certificate Validation in Bosch Smart Home System App for iOS
|
Improper certificate validation for certain connections in the Bosch Smart Home System App for iOS prior to version 9.17.1 potentially allows to intercept video contents by performing a man-in-the-middle attack.
|
[
"cpe:2.3:a:bosch:smart_home:*:*:*:*:*:iphone_os:*:*"
] | null | 6.8 | null | null | null |
GHSA-v6qx-v2fm-22f6
|
The default configuration of the server in MobaXterm before 8.3 has a disabled Access Control setting and consequently does not require authentication for X11 connections, which allows remote attackers to execute arbitrary commands or obtain sensitive information via X11 packets.
|
[] | null | null | null | null | null |
|
GHSA-q64f-858q-494q
|
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168251617
|
[] | null | null | null | null | null |
|
CVE-2020-2542
|
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).
|
[
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
CVE-2012-10043
|
ActFax 4.32 Client Importer Buffer Overflow
|
A stack-based buffer overflow vulnerability exists in ActFax Server version 4.32, specifically in the "Import Users from File" functionality of the client interface. The application fails to properly validate the length of tab-delimited fields in .exp files, leading to unsafe usage of strcpy() during CSV parsing. An attacker can exploit this vulnerability by crafting a malicious .exp file and importing it using the default character set "ECMA-94 / Latin 1 (ISO 8859)". Successful exploitation may result in arbitrary code execution, leading to full system compromise. User interaction is required to trigger the vulnerability.
|
[] | 9.3 | null | null | null | null |
GHSA-c8f9-5w72-xw7p
|
Multiple cross-site scripting (XSS) vulnerabilities in PHP JackKnife (PHPJK) allow remote attackers to inject arbitrary web script or HTML via (1) the sUName parameter to UserArea/Authenticate.php, (2) the sAccountUnq parameter to UserArea/NewAccounts/index.php, or the (3) iCategoryUnq, (4) iDBLoc, (5) iTtlNumItems, (6) iNumPerPage, or (7) sSort parameter to G_Display.php, different vectors than CVE-2005-4239.
|
[] | null | null | null | null | null |
|
CVE-2024-52008
|
Password Policy Bypass Vulnerability in Fides Webserver
|
Fides is an open-source privacy engineering platform. The user invite acceptance API endpoint lacks server-side password policy enforcement, allowing users to set arbitrarily weak passwords by bypassing client-side validation. While the UI enforces password complexity requirements, direct API calls can circumvent these checks, enabling the creation of accounts with passwords as short as a single character. When an email messaging provider is enabled and a new user account is created in the system, an invite email containing a special link is sent to the new user's email address. This link directs the new user to a page where they can set their initial password. While the user interface implements password complexity checks, these validations are only performed client-side. The underlying `/api/v1/user/accept-invite` API endpoint does not implement the same password policy validations. This vulnerability allows an invited user to set an extremely weak password for their own account during the initial account setup process. Therefore that specific user's account can be compromised easily by an attacker guessing or brute forcing the password. The vulnerability has been patched in Fides version `2.50.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no known workarounds for this vulnerability.
|
[] | 2 | null | null | null | null |
CVE-2022-49062
|
cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr
|
In the Linux kernel, the following vulnerability has been resolved:
cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr
Use the actual length of volume coherency data when setting the
xattr to avoid the following KASAN report.
BUG: KASAN: slab-out-of-bounds in cachefiles_set_volume_xattr+0xa0/0x350 [cachefiles]
Write of size 4 at addr ffff888101e02af4 by task kworker/6:0/1347
CPU: 6 PID: 1347 Comm: kworker/6:0 Kdump: loaded Not tainted 5.18.0-rc1-nfs-fscache-netfs+ #13
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-4.fc34 04/01/2014
Workqueue: events fscache_create_volume_work [fscache]
Call Trace:
<TASK>
dump_stack_lvl+0x45/0x5a
print_report.cold+0x5e/0x5db
? __lock_text_start+0x8/0x8
? cachefiles_set_volume_xattr+0xa0/0x350 [cachefiles]
kasan_report+0xab/0x120
? cachefiles_set_volume_xattr+0xa0/0x350 [cachefiles]
kasan_check_range+0xf5/0x1d0
memcpy+0x39/0x60
cachefiles_set_volume_xattr+0xa0/0x350 [cachefiles]
cachefiles_acquire_volume+0x2be/0x500 [cachefiles]
? __cachefiles_free_volume+0x90/0x90 [cachefiles]
fscache_create_volume_work+0x68/0x160 [fscache]
process_one_work+0x3b7/0x6a0
worker_thread+0x2c4/0x650
? process_one_work+0x6a0/0x6a0
kthread+0x16c/0x1a0
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x22/0x30
</TASK>
Allocated by task 1347:
kasan_save_stack+0x1e/0x40
__kasan_kmalloc+0x81/0xa0
cachefiles_set_volume_xattr+0x76/0x350 [cachefiles]
cachefiles_acquire_volume+0x2be/0x500 [cachefiles]
fscache_create_volume_work+0x68/0x160 [fscache]
process_one_work+0x3b7/0x6a0
worker_thread+0x2c4/0x650
kthread+0x16c/0x1a0
ret_from_fork+0x22/0x30
The buggy address belongs to the object at ffff888101e02af0
which belongs to the cache kmalloc-8 of size 8
The buggy address is located 4 bytes inside of
8-byte region [ffff888101e02af0, ffff888101e02af8)
The buggy address belongs to the physical page:
page:00000000a2292d70 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e02
flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)
raw: 0017ffffc0000200 0000000000000000 dead000000000001 ffff888100042280
raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff888101e02980: fc 00 fc fc fc fc 00 fc fc fc fc 00 fc fc fc fc
ffff888101e02a00: 00 fc fc fc fc 00 fc fc fc fc 00 fc fc fc fc 00
>ffff888101e02a80: fc fc fc fc 00 fc fc fc fc 00 fc fc fc fc 04 fc
^
ffff888101e02b00: fc fc fc 00 fc fc fc fc 00 fc fc fc fc 00 fc fc
ffff888101e02b80: fc fc 00 fc fc fc fc 00 fc fc fc fc 00 fc fc fc
==================================================================
|
[] | null | 7.8 | null | null | null |
GHSA-wv83-gr92-97gp
|
A cross-site scripting (XSS) vulnerability in /admin/add-fee.php of Train Scheduler App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter.
|
[] | null | 6.1 | null | null | null |
|
GHSA-4x5r-v8g2-7qhv
|
D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.
|
[] | null | null | null | null | null |
|
RHSA-2019:0981
|
Red Hat Security Advisory: python27:2.7 security update
|
python-sqlalchemy: SQL Injection when the order_by parameter can be controlled python-sqlalchemy: SQL Injection when the group_by parameter can be controlled python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 9.8 | null | null |
GHSA-cmfj-xq93-7whq
|
The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service.
|
[] | null | null | null | null | null |
|
CVE-2024-54334
|
WordPress Quran Phrases About Most People Shortcodes plugin <= 1.4 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zeshan B Quran Phrases About Most People Shortcodes allows DOM-Based XSS.This issue affects Quran Phrases About Most People Shortcodes: from n/a through 1.4.
|
[] | null | 6.5 | null | null | null |
CVE-2016-5863
|
In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, several sanity checks are missing which can lead to out-of-bounds accesses.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2001-0928
|
Buffer overflow in the permitted function of GNOME gtop daemon (libgtop_daemon) in libgtop 1.0.13 and earlier may allow remote attackers to execute arbitrary code via long authentication data.
|
[
"cpe:2.3:a:gnome:libgtop_daemon:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.13:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-p9p3-67rp-fc9g
|
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
|
[] | null | null | 6.5 | null | null |
|
CVE-2022-26126
|
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.
|
[
"cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2023-49610
|
MachineSense FeverWarn Improper Input Validation
|
MachineSense FeverWarn Raspberry Pi-based devices lack input sanitization, which could allow an attacker on an adjacent network to send a message running commands or could overflow the stack.
|
[
"cpe:2.3:o:machinesense:feverwarn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:machinesense:feverwarn:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-q78r-mh27-xp27
|
Cross-site scripting (XSS) vulnerability in LoveCMS 1.4 allows remote attackers to inject arbitrary web script or HTML via the id parameter to the top-level URI, possibly related to a SQL error.
|
[] | null | null | null | null | null |
|
RHSA-2012:1539
|
Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update
|
jabberd: Prone to unsolicited XMPP Dialback attacks
|
[
"cpe:/a:redhat:network_proxy:5.5::el5",
"cpe:/a:redhat:network_proxy:5.5::el6"
] | null | null | null | null | null |
CVE-2008-3645
|
Heap-based buffer overflow in the local IPC component in the EAPOLController plugin for configd (Networking component) in Mac OS X 10.4.11 and 10.5.5 allows local users to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2003:156
|
Red Hat Security Advisory: : : : Updated gaim client fixes vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null | null |
GHSA-vv74-wh7g-52xw
|
In the Linux kernel, the following vulnerability has been resolved:mt76: fix potential DMA mapping leakWith buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap
could potentially inherit a non-zero value from stack garbage.
If this happens, it will cause DMA mappings for MCU command frames to not be
unmapped after completion
|
[] | null | 5.3 | null | null | null |
|
CVE-2020-11806
|
In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server.
|
[
"cpe:2.3:a:mailstore:mailstore_server:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
GHSA-w9m2-v74v-fjqg
|
Format string vulnerability in MemeCode Software i.Scribe 1.88 through 2.00 before Beta9 allows remote SMTP servers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a server response, which is not properly handled "when displaying the signon message."
|
[] | null | null | null | null | null |
|
CVE-2022-41297
|
IBM Db2U cross-site request forgery
|
IBM Db2U 3.5, 4.0, and 4.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 237212.
|
[
"cpe:2.3:a:ibm:db2_on_cloud_pak_for_data:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse_on_cloud_pak_for_data:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2u:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2u:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2u:4.5:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-6f9c-c7c3-c5f9
|
A remote denial of service vulnerability in HPE Version Control Repository Manager (VCRM) in all versions prior to 7.6 was found.
|
[] | null | null | 6.5 | null | null |
|
CVE-2025-4423
|
SetupAutomationSmm:Vulnerability in the SMM module allow attacker to write arbitrary code and lead to memory corruption
|
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home
|
[] | null | 8.2 | null | null | null |
GHSA-mrx5-4724-2c6h
|
In isServerCertChainValid of InsecureEapNetworkHandler.java, there is a possible way to trust an imposter server due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 9.8 | null | null | null |
|
GHSA-jvv6-2x5h-x4xc
|
Missing Authorization vulnerability in Inisev Social Media & Share Icons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Media & Share Icons: from n/a through 2.8.1.
|
[] | null | 4.3 | null | null | null |
|
CVE-2015-8021
|
Incomplete blacklist vulnerability in the Configuration utility in F5 BIG-IP LTM, Analytics, APM, ASM, GTM, Link Controller, and PSM 11.x before 11.2.1 HF11, 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; BIG-IP AAM 11.4.0 before HF8 and 11.4.1 before HF6; BIG-IP AFM and PEM 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; and BIG-IP Edge Gateway, WebAccelerator, and WOM 11.x before 11.2.1 HF11 and 11.3.0 allows remote authenticated users to upload files via uploadImage.php.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
GHSA-xrh6-gg74-rf7v
|
Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
|
[] | null | null | null | null | null |
|
GHSA-xmh9-rg6f-j3mr
|
Verification flaw in Solid identity-token-verifier
|
ImpactSeverityAny Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod.SummaryA verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed.DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP.A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability.PatchesA new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35WorkaroundsNoneReferences_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository.Email: info@solidproject.org
|
[] | null | null | null | null | null |
CVE-2019-11955
|
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-5872-5h7r-356m
|
Polycom BToE Connector before 3.0.0 uses weak permissions (Everyone: Full Control) for "Program Files (x86)\polycom\polycom btoe connector\plcmbtoesrv.exe," which allows local users to gain privileges via a Trojan horse file.
|
[] | null | null | 7.8 | null | null |
|
GHSA-w75x-f9jm-qxx4
|
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-1301
|
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-g96h-wvrm-c2ww
|
Moodle Improper Access Control
|
The user editing form in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13, and earlier allows remote authenticated users to edit profile fields locked by the administrator.
|
[] | null | null | 6.5 | null | null |
GHSA-772j-xvf9-qpf5
|
ansible-runner vulnerable to Race Condition
|
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.
|
[] | 5.3 | 6.3 | null | null | null |
CVE-2025-23592
|
WordPress dForms plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound dForms allows Reflected XSS. This issue affects dForms: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
GHSA-c94j-hh9q-hq39
|
SQL injection vulnerability in view.php in the Friendfinder 3.3 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-f5v6-6qcg-mrg8
|
The Secure Copy Content Protection and Content Locking WordPress plugin before 4.1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
|
CVE-2013-4819
|
Unspecified vulnerability in HP IceWall SSO Agent Option 8.0 through 10.0 allows remote authenticated users to obtain sensitive information via unknown vectors.
|
[
"cpe:2.3:a:hp:icewall_sso_agent_option:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:8.0:*:*:*:2007:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:10.0:r1:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2008-0545
|
Multiple directory traversal vulnerabilities in Bubbling Library 1.32 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) uri parameter to (a) yui-menu.tpl.php, (b) simple.tpl.php, and (c) advanced.tpl.php in dispatcher/framework/; and the (2) page parameter to (d) yui-menu.php, (e) simple.php, and (f) advanced.php in dispatcher/framework/, different vectors than CVE-2008-0521.
|
[
"cpe:2.3:a:bubbling_library:bubbling_library:1.32:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-22289
|
WordPress LTL Freight Quotes – Unishippers Edition plugin <= 2.5.8 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in NotFound LTL Freight Quotes – Unishippers Edition allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LTL Freight Quotes – Unishippers Edition: from n/a through 2.5.8.
|
[] | null | 6.5 | null | null | null |
GHSA-gh84-qgjx-4xm7
|
Unrestricted upload of dangerous file types in the C21 Live Encoder and Live Mosaic product, version 5.3. This vulnerability allows a remote attacker to upload different file extensions without any restrictions, resulting in a full system compromise.
|
[] | null | 10 | null | null | null |
|
GHSA-2v3v-3whp-953h
|
starcitizentools/citizen-skin allows stored XSS in user registration date message
|
SummaryVarious date messages returned by `Language::userDate` are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM.DetailsThe result of `$this->lang->userDate( $timestamp, $this->user )` returns unescaped values, but is inserted as raw HTML by Citizen:
https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/072e4365e9084e4b153eac62d3666566c06f5a49/includes/Components/CitizenComponentUserInfo.php#L55-L60PoCGo to any page using citizen with the uselang parameter set to x-xss and while being logged in
Depending on the registration date of the account you're logged in with, various messages can be shown. In my case, it's `november`:
ImpactThis impacts wikis where a group has the `editinterface` but not the `editsitejs` user right.
|
[] | null | 6.5 | null | null | null |
GHSA-6g68-j794-47g7
|
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu/pm: Fix NULL pointer dereference when get power limitBecause powerplay_table initialization is skipped under
sriov case, We check and set default lower and upper OD
value if powerplay_table is NULL.
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-23979
|
Mozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-4qm6-3vx6-hg5q
|
Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.
|
[] | null | null | null | null | null |
|
CVE-2017-2415
|
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code by leveraging an unspecified "type confusion."
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-33pm-r6fv-2cr8
|
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Audio" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a crafted audio file.
|
[] | null | null | 7.8 | null | null |
|
CVE-2011-3724
|
CubeCart 4.4.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/shipping/USPS/calc.php and certain other files.
|
[
"cpe:2.3:a:cubecart:cubecart:4.4.3:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-3866
|
lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
|
[
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-qrp4-fhcg-859g
|
A directory traversal vulnerability exists in the TicketTemplateActions.aspx GetTemplateAttachment functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability.
|
[] | null | 6.5 | null | null | null |
|
GHSA-cwcj-fm93-gwcg
|
An issue was discovered in Open Ticket Request System (OTRS) 7.x before 7.0.5. An attacker who is logged into OTRS as an agent or a customer user can use the search result screens to disclose information from invalid system entities. Following is the list of affected entities: Custom Pages, FAQ Articles, Service Catalogue Items, ITSM Configuration Items.
|
[] | null | null | 4.3 | null | null |
|
GHSA-hm92-73j4-xqph
|
The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uagb block in all versions up to, and including, 2.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2024:10592
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null | null |
CVE-2023-52843
|
llc: verify mac len before reading mac header
|
In the Linux kernel, the following vulnerability has been resolved:
llc: verify mac len before reading mac header
LLC reads the mac header with eth_hdr without verifying that the skb
has an Ethernet header.
Syzbot was able to enter llc_rcv on a tun device. Tun can insert
packets without mac len and with user configurable skb->protocol
(passing a tun_pi header when not configuring IFF_NO_PI).
BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218
__netif_receive_skb_one_core net/core/dev.c:5523 [inline]
__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
netif_receive_skb_internal net/core/dev.c:5723 [inline]
netif_receive_skb+0x58/0x660 net/core/dev.c:5782
tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002
Add a mac_len test before all three eth_hdr(skb) calls under net/llc.
There are further uses in include/net/llc_pdu.h. All these are
protected by a test skb->protocol == ETH_P_802_2. Which does not
protect against this tun scenario.
But the mac_len test added in this patch in llc_fixup_skb will
indirectly protect those too. That is called from llc_rcv before any
other LLC code.
It is tempting to just add a blanket mac_len check in llc_rcv, but
not sure whether that could break valid LLC paths that do not assume
an Ethernet header. 802.2 LLC may be used on top of non-802.3
protocols in principle. The below referenced commit shows that used
to, on top of Token Ring.
At least one of the three eth_hdr uses goes back to before the start
of git history. But the one that syzbot exercises is introduced in
this commit. That commit is old enough (2008), that effectively all
stable kernels should receive this.
|
[] | null | null | null | null | null |
CVE-2019-10193
|
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
|
[
"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
|
GHSA-4cm9-vfcj-fcm5
|
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.4.37651. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled.
|
[] | null | 8.8 | null | null | null |
|
GHSA-rwr4-qw9c-fjxm
|
The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.Workarounds or Mitigation:Versa recommends the following security controls:Change default passwords to complex passwordsPasswords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special characterPasswords must be changed at least every 90 daysPassword change history is checked to ensure that the at least the last 5 passwords must be used when changing password.Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6w3p-5v24-hp57
|
Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-22764
|
Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-2w87-fjj9-j39h
|
A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-46152
|
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains a type confusion vulnerability while parsing NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14643, ZDI-CAN-14644, ZDI-CAN-14755, ZDI-CAN-15183)
|
[
"cpe:2.3:a:siemens:simcenter_femap:2020.2:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack3:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2023-2227
|
Improper Authorization in modoboa/modoboa
|
Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.
|
[
"cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | null | null |
GHSA-9h2f-7xpr-xgq4
|
Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
|
[] | null | 7.2 | null | null | null |
|
CVE-2021-46908
|
bpf: Use correct permission flag for mixed signed bounds arithmetic
|
In the Linux kernel, the following vulnerability has been resolved:
bpf: Use correct permission flag for mixed signed bounds arithmetic
We forbid adding unknown scalars with mixed signed bounds due to the
spectre v1 masking mitigation. Hence this also needs bypass_spec_v1
flag instead of allow_ptr_leaks.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2025-5277
|
aws-mcp-server MCP server is vulnerable to command injection. An attacker can craft a prompt that once accessed by the MCP client will run arbitrary commands on the host system.
|
[] | 9.4 | 9.6 | null | null | null |
|
GHSA-cwqf-qvq3-6787
|
An issue was discovered in certain Apple products. Safari before 10.1 is affected. The issue involves the "Safari Login AutoFill" component. It allows local users to obtain access to locked keychain items via unspecified vectors.
|
[] | null | null | 5.5 | null | null |
|
CVE-2018-6308
|
Multiple SQL injections exist in SugarCRM Community Edition 6.5.26 and below via the track parameter to modules\Campaigns\Tracker.php and modules\Campaigns\utils.php, the default_currency_name parameter to modules\Configurator\controller.php and modules\Currencies\Currency.php, the duplicate parameter to modules\Contacts\ShowDuplicates.php, the mergecur parameter to modules\Currencies\index.php and modules\Opportunities\Opportunity.php, and the load_signed_id parameter to modules\Documents\Document.php.
|
[
"cpe:2.3:a:sugarcrm:sugarcrm:6.5.26:*:*:*:community:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-mwv2-c8v8-86px
|
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a memory address leak vulnerability. Successful exploitation could lead to information disclosure .
|
[] | null | null | null | null | null |
|
CVE-2006-5775
|
Cross-site scripting (XSS) vulnerability in profile.php in FunkBoard 0.71 before 4 November 2006 at 18:16 GMT allows remote attackers to inject arbitrary web script or HTML, possibly via the name parameter.
|
[
"cpe:2.3:a:funkboard:funkboard:0.71:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-42389
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18658.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
CVE-2021-46532
|
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
|
[
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2025-32882
|
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message.
|
[] | null | 5.3 | null | null | null |
|
GHSA-wvq3-7rfx-ppf9
|
When performing the inference shape operation of the Tile operator, if the input data type is not int or int32, it will access data outside of bounds of heap allocated buffers.
|
[] | null | 7.5 | null | null | null |
|
GHSA-8w38-x469-hfxf
|
A vulnerability, which was classified as critical, has been found in SourceCodester E-Commerce System 1.0. This issue affects some unknown processing of the file /ecommerce/admin/settings/setDiscount.php. The manipulation of the argument id with the input 201737 AND (SELECT 8973 FROM (SELECT(SLEEP(5)))OoAD) leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223409 was assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-8602
|
A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. A malicious application may be able to elevate privileges.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2014-0316
|
Memory leak in the Local RPC (LRPC) server implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (memory consumption) and bypass the ASLR protection mechanism via a crafted client that sends messages with an invalid data view, aka "LRPC ASLR Bypass Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-54w7-jv4g-qhqg
|
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
|
[] | null | 9.1 | null | null | null |
|
CVE-2021-0173
|
Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.
|
[
"cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
GHSA-89cp-h835-xwpc
|
Auth. (shop manager+) Stored Cross-Site Scripting (XSS) vulnerability in PHPRADAR Woocommerce Tip/Donation plugin <= 1.2 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-jh3p-chcw-4c58
|
Multiple cross-site scripting (XSS) vulnerabilities in NagiosQL 3.2 SP2 allow remote attackers to inject arbitrary web script or HTML via the txtSearch parameter to (1) admin/hostdependencies.php, (2) admin/hosts.php, or other unspecified pages that allow search input, related to the search functionality in functions/content_class.php.
|
[] | null | null | null | null | null |
|
GHSA-wqqh-79fq-5fg5
|
An issue was discovered in Echo ShareCare 8.15.5. The file-upload feature in Access/DownloadFeed_Mnt/FileUpload_Upd.cfm is susceptible to an unrestricted upload vulnerability via the name1 parameter, when processing remote input from an authenticated user, leading to the ability for arbitrary files to be written to arbitrary filesystem locations via ../ Directory Traversal on the Z: drive (a hard-coded drive letter where ShareCare application files reside) and remote code execution as the ShareCare service user (NT AUTHORITY\SYSTEM).
|
[] | null | null | null | null | null |
|
GHSA-xf94-mpvp-r8x2
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-1226
|
Multiple vulnerabilities in Rejetto's Http File Server
|
The software does not neutralize or incorrectly neutralizes certain characters before the data is included in outgoing HTTP headers. The inclusion of invalidated data in an HTTP header allows an attacker to specify the full HTTP response represented by the browser. An attacker could control the response and craft attacks such as cross-site scripting and cache poisoning attacks.
|
[
"cpe:2.3:a:rejetto:http_file_server:2.2a:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
RHSA-2024:0412
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: data races around sk->sk_prot kernel: USB-accessible buffer overflow in brcmfmac kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h kernel: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: HID: check empty report_list in hid_validate_values() kernel: hid: Use After Free in asus_remove() kernel: use-after-free in smb2_is_status_io_timeout() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: Spectre v2 SMT mitigations problem kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: out-of-bounds access in relay_file_read kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: slab-out-of-bounds read vulnerabilities in cbq_classify kernel: mpls: double free on sysctl allocation failure kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: HID: betop: check shape of output reports kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | 5.6 | null | null |
GHSA-qr5w-gmhq-ch9c
|
xfind/search in Ximdex 4.0 has XSS via the filter[n][value] parameters for non-negative values of n, as demonstrated by n equal to 0 through 12.
|
[] | null | null | 6.1 | null | null |
|
RHSA-2024:10879
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8.8 | null | null | null |
GHSA-g4qr-pvvg-9h2w
|
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.
|
[] | null | 6.3 | null | null | null |
|
CVE-2020-7721
|
Prototype Pollution
|
All versions of package node-oojs are vulnerable to Prototype Pollution via the setPath function.
|
[
"cpe:2.3:a:node-oojs_project:node-oojs:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null | null |
CVE-2017-6047
|
Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication.
|
[
"cpe:2.3:a:3m:detcon_sitewatch_gateway:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
|
CVE-2013-5351
|
Heap-based buffer overflow in IrfanView before 4.37 allows remote attackers to execute arbitrary code via the LZW code stream in a GIF file.
|
[
"cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.75:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.98a:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.99:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.05:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.07:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.37:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.63:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.66:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.68:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.82:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.83:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.05:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.07:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.70:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.91:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.99:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.35:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2269-968q-6hcq
|
Memory corruption due to improper access control in Qualcomm IPC.
|
[] | null | 7.8 | null | null | null |
|
GHSA-82vp-x6m8-qwh2
|
The WP Born Babies WordPress plugin through 1.0 does not sanitise and escape some of its fields, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-46650
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15536.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
GHSA-j4j8-493g-r4rx
|
The HQ Rental Software plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.29. This is due to missing or incorrect nonce validation on the displaySettingsPage() function. This makes it possible for unauthenticated attackers to update arbitrary options that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 8.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.