id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-21662
|
Argo CD vulnerable to Bypassing of Rate Limit and Brute Force Protection Using Cache Overflow
|
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can effectively bypass the rate limit and brute force protections by exploiting the application's weak cache-based mechanism. This loophole in security can be combined with other vulnerabilities to attack the default admin account. This flaw undermines a patch for CVE-2020-8827 intended to protect against brute-force attacks. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. This cache is limited to a `defaultMaxCacheSize` of 1000 entries. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account. This is a severe vulnerability that enables attackers to perform brute force attacks at an accelerated rate, especially targeting the default admin account. Users should upgrade to version 2.8.13, 2.9.9, or 2.10.4 to receive a patch.
|
[
"cpe:2.3:a:linuxfoundation:argo-cd:2.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:argo-cd:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-7p43-ch8g-7vxg
|
PDF-XChange Editor Net.HTTP.requests Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the Net.HTTP.requests method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-20211.
|
[] | null | null | 5.5 | null | null |
|
GHSA-mfrf-wpm5-gv78
|
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device.When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart.The leak can be monitored with the CLI command:show task memory detail | match task_shard_mgmt_cookiewhere the allocated memory in bytes can be seen to continuously increase with each exploitation.This issue affects:Junos OS:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S11,22.2 versions before 22.2R3-S7,22.4 versions before 22.4R3-S7,23.2 versions before 23.2R2-S4,23.4 versions before 23.4R2-S4,24.2 versions before 24.2R2,24.4 versions before 24.4R1-S2, 24.4R2;Junos OS Evolved:all versions before 22.2R3-S7-EVO22.4-EVO versions before 22.4R3-S7-EVO,23.2-EVO versions before 23.2R2-S4-EVO,23.4-EVO versions before 23.4R2-S4-EVO,24.2-EVO versions before 24.2R2-EVO,24.4-EVO versions before 24.4R2-EVO.
|
[] | 6.8 | 5.5 | null | null | null |
|
CVE-2023-49676
|
CODESYS: Use after free vulnerability through corrupted project files
|
An unauthenticated local attacker may trick a user to open corrupted project files to crash the system due to use after free vulnerability.
|
[] | null | 5.5 | null | null | null |
GHSA-wr5j-q359-6vr2
|
backup-agoddard and backup_checksum have Information Exposure vulnerability
|
(1) `lib/backup/cli/utility.rb` in the `backup-agoddard` gem 3.0.28 and (2) `lib/backup/cli/utility.rb` in the `backup_checksum` gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process.
|
[] | null | null | 7.8 | null | null |
GHSA-hx93-vr6p-r3mw
|
In Parse_lins of eas_mdls.c, there is possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127313764
|
[] | null | null | null | null | null |
|
GHSA-5xp9-mqm3-5jw2
|
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module.
|
[] | null | null | 9.8 | null | null |
|
CVE-2016-4290
|
When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a block of data within the file. When calculating this length, the application will use a value from the file and add a constant to it without checking whether the addition of the constant will cause the integer to overflow which will cause the buffer to be undersized when the application tries to copy file data into it. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application.
|
[
"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-q65r-m36g-g835
|
A directory permissions management vulnerability in Lenovo System Update may allow elevation of privileges.
|
[] | null | 7 | null | null | null |
|
GHSA-pxvc-5jrx-h52p
|
A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 6.3 | null | null | null |
|
CVE-2017-18452
|
cPanel before 64.0.21 allows code execution via Rails configuration files (SEC-259).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.7 | 4.6 | null |
|
RHSA-2012:1186
|
Red Hat Security Advisory: katello security update
|
Katello: Application.config.secret_token is not generated properly
|
[
"cpe:/a:cloudforms_systemengine:1::el6"
] | null | null | null | null | null |
GHSA-q7p4-7xjv-j3wf
|
Fabio allows HTTP clients to manipulate custom headers it adds
|
SummaryFabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers.Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities.However, it was found that some of these custom headers can indeed be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. By setting the following connection header, the X-Forwarded-Host header can, for example, be removed:Similar critical vulnerabilities have been identified in other web servers and proxies, including [CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813) in Apache HTTP Server and [CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv) in Traefik.DetailsIt was found that the following headers can be removed in this way (i.e. by specifying them within a connection header):X-Forwarded-HostX-Forwarded-PortX-Forwarded-ProtoX-Real-IpForwardedPoCThe following docker-compose file was used for testing:The fabio.properties configuration:A Python container runs a simple HTTP server that logs received headers.
The Dockerfile:Python Flask ServerA normal HTTP request/response pair looks like this:Requestcurl commandResponseServer LogNext, a request, where the Forwarded header is defined as a hop-by-hop header via the Connection header is sent:Requestcurl commandResponseServer LogsThe response shows that Fabio's `Forwarded` header was removed from the requestImpactIf the backend application trusts these custom headers for security-sensitive operations, their removal or modification may lead to vulnerabilities such as access control bypass.This vulnerability has a critical severity rating similar to [CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813) (Apache HTTP Server, 9.8) and [CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv) (Traefik, 9.3)Stripping headers like `X-Real-IP` can confuse the upstream server about whether the request is coming from an external client through the reverse proxy or from an internal source. This type of vulnerability can be exploited as demonstrated in: [Versa Concerto RCE](https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce).References[CVE-2024-45410](https://github.com/advisories/GHSA-62c8-mh53-4cqv)[CVE-2022-31813](https://nvd.nist.gov/vuln/detail/CVE-2022-31813)[Versa Concerto RCE](https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce)
|
[] | null | 9.1 | null | null | null |
GHSA-892c-ggr4-vgr5
|
Cross-site scripting (XSS) vulnerability in the help component of SAP BusinessObjects Financial Consolidation 10.0.0.1933 allows remote attackers to inject arbitrary web script or HTML via a GET request. /finance/help/en/frameset.htm is the URI for this component. The vendor response is SAP Security Note 2368106.
|
[] | null | null | 4.7 | null | null |
|
CVE-2007-1950
|
Cross-site scripting (XSS) vulnerability in index_cms.php in WebBlizzard CMS allows remote attackers to inject arbitrary web script or HTML via the Suchzeile parameter.
|
[
"cpe:2.3:a:webblizzard:content_management_system:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2018-1495
|
IBM FlashSystem V840 and V900 products could allow an authenticated attacker with specialized access to overwrite arbitrary files which could cause a denial of service. IBM X-Force ID: 141148.
|
[
"cpe:2.3:o:ibm:flashsystem_900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:flashsystem_900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:flashsystem_840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:flashsystem_840:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
CVE-1999-1164
|
Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang.
|
[
"cpe:2.3:a:microsoft:outlook:97:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-25780
|
Information leak via device availability query function
|
Information Exposure vulnerability in web UI of Secomea GateManager allows logged in user to query devices outside own scope.
|
[
"cpe:2.3:o:secomea:gatemanager_4250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:secomea:gatemanager_4250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:secomea:gatemanager_4260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:secomea:gatemanager_4260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:secomea:gatemanager_8250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:secomea:gatemanager_8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:secomea:gatemanager_9250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:secomea:gatemanager_9250:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2014-3681
|
Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-30459
|
SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default).
|
[
"cpe:2.3:a:smartptt:smartptt_scada:1.1:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2006-5896
|
REMLAB Web Mech Designer 2.0.5 allows remote attackers to obtain the full path of the script via an incorrect Tonnage parameter to calculate.php that triggers a divide-by-zero error, which leaks the path in an error message.
|
[
"cpe:2.3:a:remlab:web_mech_designer:2.0.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-14478
|
IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611
|
A local, authenticated attacker could use an XML External Entity (XXE) attack to exploit weakly configured XML files to access local or remote content. A successful exploit could potentially cause a denial-of-service condition and allow the attacker to arbitrarily read any local file via system-level services.
|
[
"cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.6 | null |
GHSA-pc34-r93m-6qjp
|
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows remote authenticated users to bypass intended access restrictions and read configuration files by leveraging the Mobile and Remote Access (MRA) role and establishing a TFTP session, aka Bug ID CSCuv78531.
|
[] | null | null | null | null | null |
|
GHSA-r6hg-m6fm-hgwr
|
Improper authorization in Dynamics 365 Business Central resulted in a vulnerability that allows an authenticated attacker to elevate privileges over a network.
|
[] | null | 8.1 | null | null | null |
|
GHSA-r3xc-mh5x-gjfq
|
Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of service via local access.
|
[] | 5.6 | 5.3 | null | null | null |
|
CVE-2021-30074
|
docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character.
|
[
"cpe:2.3:a:docsifyjs:docsify:4.12.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-6j3v-c2g4-6qqf
|
The WP Data Access – App, Table, Form and Chart Builder plugin plugin for WordPress is vulnerable to SQL Injection via the 'order[user_login][dir]' parameter in all versions up to, and including, 5.5.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-11965
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Anyone can execute proptrigger.sh which will lead to change in properties.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
GHSA-hwv7-wjc3-wjwc
|
Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via the User Avatar attribute.
|
[] | null | null | null | null | null |
|
CVE-2024-10548
|
WP Project Manager <= 2.6.15 - Authenticated (Subscriber+) Sensitive Information Exposure via Project Task List REST API
|
The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators).
|
[] | null | 6.5 | null | null | null |
CVE-2005-4820
|
SMC Wireless Router model SMC7904WBRA allows remote attackers to cause a denial of service (reboot) by flooding the router with traffic.
|
[
"cpe:2.3:h:smc_networks:smc7904wbra:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2015-8547
|
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
|
[
"cpe:2.3:a:quassel-irc:quassel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-756x-w82w-pwjj
|
QuickTime in Apple OS X before 10.11.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FlashPix image, a different vulnerability than CVE-2016-1767.
|
[] | null | null | 7.8 | null | null |
|
CVE-2018-2857
|
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: HTTP data path subsystems). The supported version that is affected is Prior to 8.7.17. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data as well as unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
|
[
"cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.5 | null |
|
CVE-2021-36805
|
Akaunting Invoice Footer Persistent XSS
|
Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in the sales invoice processing component of the application. This issue was fixed in version 2.1.13 of the product.
|
[
"cpe:2.3:a:akaunting:akaunting:*:*:*:*:*:*:*:*"
] | null | 5.2 | null | null | null |
GHSA-xjrj-rw96-5445
|
A vulnerability in the ConfD server in Cisco Ultra Services Platform could allow an authenticated, local attacker to view sensitive information. More Information: CSCvd29398. Known Affected Releases: 21.0.v0.65839.
|
[] | null | null | 5.5 | null | null |
|
GHSA-3q86-gfmq-f6c6
|
Buffer overflow in BIND 8.2 via NXT records.
|
[] | null | null | null | null | null |
|
CVE-2020-16120
|
Unprivileged overlay + shiftfs read access
|
Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 5.1 | null | null | null |
CVE-2001-0328
|
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
|
[] | null | null | null | 5 | null |
|
CVE-2012-6459
|
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.
|
[
"cpe:2.3:a:intel:connman:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-11826
|
Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress <= 3.10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'quillforms-popup' shortcode in all versions up to, and including, 3.10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2020-11529
|
Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x.
|
[
"cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 | null |
|
GHSA-hwgj-465x-qhm2
|
Buffer overflow in libmysqlclient.so in MySQL 3.23.33 and earlier allows remote attackers to execute arbitrary code via a long host parameter.
|
[] | null | null | null | null | null |
|
CVE-2014-1459
|
SQL injection vulnerability in dg-admin/index.php in doorGets CMS 5.2 and earlier allows remote authenticated administrators to execute arbitrary SQL commands via the _position_down_id parameter. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
|
[
"cpe:2.3:a:doorgets:doorgets_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:doorgets:doorgets_cms:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:doorgets:doorgets_cms:4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2018-19889
|
An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 6 case.
|
[
"cpe:2.3:a:audiocoding:freeware_advanced_audio_coder:1.29.9.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-1999-0341
|
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
|
[
"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-8357-fjvx-xrm8
|
Microweber has Reflected XSS Vulnerability in the id Parameter
|
Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
|
[] | null | 6.1 | null | null | null |
GHSA-849p-5hj4-w47q
|
** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vcxx-p2xf-cf5w
|
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and before 7.0.10 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI commands
|
[] | null | 6.7 | null | null | null |
|
RHSA-2022:5529
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS when processing gopher server responses
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-p3fq-j9q2-xx6p
|
IBM Jazz Foundation products could disclose sensitive information to an authenticated attacker that could be used in further attacks against the system. IBM X-Force ID: 139026.
|
[] | null | null | 6.5 | null | null |
|
CVE-2006-5019
|
Google Mini 4.4.102.M.36 and earlier allows remote attackers to obtain sensitive information via a direct request for /search with an invalid client parameter, which reveals the path in an error message.
|
[
"cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-283j-88x2-fqpr
|
Multiple SQL injection vulnerabilities in aWebNews 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) user123 variable in (a) login.php or (b) fpass.php; or (2) cid parameter to (c) visview.php.
|
[] | null | null | null | null | null |
|
GHSA-29r7-6cj9-gh39
|
A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[] | null | null | 6.6 | null | null |
|
CVE-2022-23804
|
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:kicad:eda:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
CVE-2020-27272
|
SOOIL Developments CoLtd DiabecareRS, AnyDana-i, AnyDana-A, The communication protocol of the insulin pump and AnyDana-i,AnyDana-A mobile apps doesn't use adequate measures to authenticate the pump before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the keys and spoof the pump via BLE.
|
[
"cpe:2.3:o:sooil:anydana-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:anydana-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sooil:anydana-i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:anydana-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sooil:diabecare_rs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:diabecare_rs:-:*:*:*:*:*:*:*"
] | null | 5.7 | null | 2.9 | null |
|
CVE-2025-38171
|
power: supply: max77705: Fix workqueue error handling in probe
|
In the Linux kernel, the following vulnerability has been resolved:
power: supply: max77705: Fix workqueue error handling in probe
The create_singlethread_workqueue() doesn't return error pointers, it
returns NULL. Also cleanup the workqueue on the error paths.
|
[] | null | null | null | null | null |
CVE-2024-11606
|
Tabs Shortcode <= 2.0.2 - Contributor+ XSS via Shortcode
|
The Tabs Shortcode WordPress plugin through 2.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 5.3 | null | null | null |
GHSA-5c2q-g9wc-9gf6
|
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
|
[] | null | 7.7 | null | null | null |
|
GHSA-5px6-qr34-v59r
|
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /viewrequest.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2023-34552
|
In certain EZVIZ products, two stack based buffer overflows in mulicast_parse_sadp_packet and mulicast_get_pack_type functions of the SADP multicast protocol can allow an unauthenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214.
|
[
"cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr-mul_firmware:5.3.2:build230218:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-c6n-r101-1g2wf_firmware:5.3.0:build230215:*:*:*:*:*:*",
"cpe:2.3:a:ezviz:cv310-a0-1b2wfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-c6n-b0-1g2wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-c6n-b0-1g2wf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-c6n-r101-1g2wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-c6n-r101-1g2wf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-cv310-a0-1b2wfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-cv310-a0-1b2wfr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-cv310-a0-1c2wfr-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-cv310-a0-1c2wfr-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr-mul_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-c6n-a0-1c2wfr-mul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-cv310-a0-3c2wfrl-1080p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-cv310-a0-3c2wfrl-1080p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-cv310-a0-1c2wfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-cv310-a0-1c2wfr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:cs-cv248-a0-32wmfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:cs-cv248-a0-32wmfr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ezviz:lc1c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ezviz:lc1c:-:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
GHSA-4ccr-c6hg-r7x3
|
An integer overflow was addressed through improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2025:0138
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2005-2128
|
QUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.
|
[
"cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-g9cc-xw8r-hj44
|
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
|
[] | null | null | null | null | null |
|
GHSA-3q8j-579q-jx44
|
The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case.An attacker may cause the reference count to overflow, leading to a use after free (UAF).
|
[] | null | 7.7 | null | null | null |
|
CVE-2003-0216
|
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
|
[
"cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-vxc7-mqp8-h5jr
|
Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | 8.8 | null | null |
|
CVE-2006-2463
|
view_album.php in SelectaPix 1.31 and earlier allows remote attackers to obtain the installation path via a certain request, which displays the path in an error message, possibly due to an invalid or missing parameter.
|
[
"cpe:2.3:a:out_of_the_trees_web_design:selectapix:1.31:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2009-0970
|
PHP remote file inclusion vulnerability in includes/class_image.php in PHP Pro Bid 6.05, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the fileExtension parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:phpprobid:php_pro_bid:6.05:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-p594-hvv6-pr97
|
An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server.
|
[] | null | null | 7.5 | null | null |
|
CVE-2017-16758
|
Cross-site scripting (XSS) vulnerability in admin/partials/uif-access-token-display.php in the Ultimate Instagram Feed plugin before 1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "access_token" parameter.
|
[
"cpe:2.3:a:ultimate_instagram_feed_project:ultimate_instagram_feed:*:*:*:*:*:wordpress:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2021-37672
|
Heap OOB in `SdcaOptimizerV2` in TensorFlow
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples. We have patched the issue in GitHub commit a4e138660270e7599793fa438cd7b2fc2ce215a6. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2018-20776
|
Frog CMS 0.9.5 provides a directory listing for a /public request.
|
[
"cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-fppm-3x24-27q8
|
Format string vulnerability in Infodrom cfingerd 1.4.3 and earlier allows a remote attacker to gain additional privileges via a malformed ident reply that is passed to the syslog function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-15545
|
An issue was discovered in the libp2p-core crate before 0.8.1 for Rust. Attackers can spoof ed25519 signatures.
|
[
"cpe:2.3:a:libp2p:libp2p:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2023:6324
|
Red Hat Security Advisory: python3.11-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null | null |
CVE-2020-1107
|
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1104, CVE-2020-1105.
|
[
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2021-1725
|
Bot Framework SDK Information Disclosure Vulnerability
|
Bot Framework SDK Information Disclosure Vulnerability
|
[
"cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:.net_framework:*:*",
"cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:javascript:*:*",
"cpe:2.3:a:microsoft:bot_framework_software_development_kit:-:*:*:*:*:python:*:*"
] | null | 5.5 | null | null | null |
GHSA-gcj2-8cp7-j4jx
|
A security feature bypass vulnerability exists when the Microsoft Outlook attachment block filter does not properly handle attachments, aka "Microsoft Outlook Security Feature Bypass Vulnerability." This affects Microsoft Office.
|
[] | null | null | 6.5 | null | null |
|
GHSA-p96g-c878-c43j
|
The Event List WordPress plugin before 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed
|
[] | null | 4.8 | null | null | null |
|
CVE-2017-10604
|
Junos OS: SRX Series: Cluster configuration sync failures occur if the root user account is locked out
|
When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out. Administrators can confirm if the root account is locked out via the following command root@device> show system login lockout user root User Lockout start Lockout end root 1995-01-01 01:00:01 PDT 1995-11-01 01:31:01 PDT Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D65 on SRX series; 12.3X48 prior to 12.3X48-D45 on SRX series; 15.1X49 prior to 15.1X49-D75 on SRX series.
|
[
"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
CVE-2000-0357
|
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
|
[
"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2015-3150
|
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
|
[
"cpe:2.3:a:redhat:automatic_bug_reporting_tool:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 7.2 | null |
|
CVE-2021-28485
|
In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS web application allows relative path traversal via a specific parameter in the https request after authentication, which allows access to files on the system that are not intended to be accessible via the web application.
|
[
"cpe:2.3:o:ericsson:mobile_switching_center_server_bc_18a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ericsson:mobile_switching_center_server_bc_18a:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2024-39822
|
Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure
|
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
|
[
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-0219
|
FluentSMTP < 2.2.3 - Stored XSS via Email Logs
|
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
|
[
"cpe:2.3:a:wpmanageninja:fluentsmtp:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-4xmw-cxj4-7pmf
|
A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-29305
|
imgurl v2.31 was discovered to contain a Blind SQL injection vulnerability via /upload/localhost.
|
[
"cpe:2.3:a:imgurl_project:imgurl:2.31:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 | null |
|
GHSA-p44r-3x7c-4h83
|
Server-Side Request Forgery (SSRF) vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.0.11.
|
[] | null | 5.4 | null | null | null |
|
CVE-2022-20937
|
A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device.
This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications.
There are workarounds that address this vulnerability.
|
[
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2016-9401
|
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
|
[
"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.4:patch2:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.4:patch3:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.4:patch4:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.4:patch5:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | 2.1 | null |
|
GHSA-h686-wf4f-g3q9
|
cfnetwork.dll 1.450.5.0 in CFNetwork, as used by safari.exe 531.21.10 in Apple Safari 4.0.4 on Windows, allows remote attackers to cause a denial of service (application crash) via a long string in the SRC attribute of a (1) IMG or (2) IFRAME element.
|
[] | null | null | null | null | null |
|
GHSA-pjpg-8wjw-xmv3
|
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-30218
|
Denial of service (DOS) vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
|
The ABAP Application Server of SAP NetWeaver as well as ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.
|
[] | null | 6.5 | null | null | null |
CVE-2022-42478
|
An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.
|
[
"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
CVE-2020-1148
|
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1289.
|
[
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-h34q-7cxx-g6r9
|
IBM Rational Engineering Lifecycle Manager 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123187.
|
[] | null | null | 5.4 | null | null |
|
GHSA-3f37-xrxw-857g
|
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly allocate memory, which allows remote attackers to cause a denial of service via a crafted (1) web site or (2) file, aka "Adobe Font Driver Denial of Service Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2017-5219
|
An issue was discovered in SageCRM 7.x before 7.3 SP3. The Component Manager functionality, provided by SageCRM, permits additional components to be added to the application to enhance provided functionality. This functionality allows a zip file to be uploaded, containing a valid .ecf component file, which will be extracted to the inf directory outside of the webroot. By creating a zip file containing an empty .ecf file, to pass file-validation checks, any other file provided in zip file will be extracted onto the filesystem. In this case, a web shell with the filename '..\WWWRoot\CustomPages\aspshell.asp' was included within the zip file that, when extracted, traversed back out of the inf directory and into the SageCRM webroot. This permitted remote interaction with the underlying filesystem with the highest privilege level, SYSTEM.
|
[
"cpe:2.3:a:sagecrm:sagecrm:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sagecrm:sagecrm:7.3:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sagecrm:sagecrm:7.3:sp2:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.