id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-jfrf-vv54-j2jg
|
Margox Braft-Editor Cross-site Scripting Vulnerability
|
Cross Site Scripting (XSS) vulnerability in margox braft-editor version 2.3.8, allows remote attackers to execute arbitrary code via the embed media feature.
|
[] | null | 6.1 | null | null | null |
GHSA-6fqw-5hjj-frp3
|
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-8234
|
In all Android releases from CAF using the Linux kernel, an out of bounds access can potentially occur in a camera function.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-rj3p-xj8v-g5w3
|
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been rated as critical. Affected by this issue is the function setL2tpServerCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 5.3 | null | null | null |
|
CVE-2023-5146
|
D-Link DAR-7000/DAR-8000 updatelib.php unrestricted upload
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231 and classified as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240242 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
[
"cpe:2.3:o:dlink:dar-7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dar-8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dar-8000:-:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_upload_%20updatelib.md
|
GHSA-qr3r-9qvv-xj4c
|
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, and CVE-2013-0623.
|
[] | null | null | null | null | null |
|
GHSA-r4qf-77fr-vfcg
|
The id parameter in detail.php of Online Book Store v1.0 is vulnerable to union-based blind SQL injection, which leads to the ability to retrieve all databases.
|
[] | null | null | null | null | null |
|
CVE-2021-31191
|
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
|
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.982:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-1999-0215
|
Routed allows attackers to append data to files.
|
[
"cpe:2.3:o:sgi:irix:3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2013-3431
|
Cisco Video Surveillance Manager (VSM) before 7.0.0 does not require authentication for access to VSMC monitoring pages, which allows remote attackers to obtain sensitive configuration, archive, and log information via unspecified vectors, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv40169.
|
[
"cpe:2.3:a:cisco:video_surveillance_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr3:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2013-6205
|
Unspecified vulnerability in HP Rapid Deployment Pack (RDP) and Insight Control Server Deployment allows local users to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
|
[
"cpe:2.3:a:hp:insight_control_server_deployment:-:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:rapid_deployment_pack:-:*:*:*:*:*:*:*"
] | null | null | null | 4.1 | null |
|
GHSA-25gf-3pvp-fcgp
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. Processing a maliciously crafted image may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
GHSA-f363-c9mp-hmh3
|
Heap-based buffer overflow in yEnc32 1.0.7.207 allows user-assisted remote attackers to execute arbitrary code via a long filename in an NTX file.
|
[] | null | null | null | null | null |
|
CVE-2016-5465
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote attackers to affect confidentiality and integrity via vectors related to Panel Processor.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 | null |
|
GHSA-vhc3-5294-q3c8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xolluteon Dropshix allows DOM-Based XSS.This issue affects Dropshix: from n/a through 4.0.14.
|
[] | null | 5.9 | null | null | null |
|
GHSA-x9f6-hx4w-vq6q
|
An issue in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 allows a local attacker to escalate privileges via the function tftp_image_check of a binary named rc.
|
[] | null | 7.8 | null | null | null |
|
GHSA-rcww-x8ph-8v37
|
Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 do not restrict the number of unauthenticated sessions to certain interfaces, which allows remote attackers to cause a denial of service (file descriptor exhaustion and disk space exhaustion) via a series of TCP connections.
|
[] | null | null | null | null | null |
|
CVE-2014-2867
|
Unrestricted file upload vulnerability in PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to execute arbitrary code by uploading a ColdFusion page, and then accessing it via unspecified vectors.
|
[
"cpe:2.3:a:paperthin:commonspot_content_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2015-4745
|
Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2605, and CVE-2015-2606.
|
[
"cpe:2.3:a:oracle:fusion_middleware:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-47371
|
In bt driver, there is a thread competition leads to early release of resources to be accessed. This could lead to local denial of service in kernel.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2021-43523
|
In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.
|
[
"cpe:2.3:a:uclibc:uclibc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:uclibc-ng_project:uclibc-ng:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 | null |
|
GHSA-785m-5v8g-vf98
|
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
|
[] | null | 7.7 | null | null | null |
|
CVE-2018-4328
|
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-8gq2-wxqv-qc6m
|
A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs.
|
[] | null | null | null | null | null |
|
CVE-2019-2761
|
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Attachments / File Upload). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:application_object_library:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_object_library:12.1.3:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 | null |
|
CVE-2013-3050
|
SQL injection vulnerability in ZAPms 1.41 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter to product.
|
[
"cpe:2.3:a:zapms:zapms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zapms:zapms:1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:zapms:zapms:1.40:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-x57m-fjm7-96hr
|
PHP remote file inclusion vulnerability in cp_html2txt.php in All In One Control Panel (AIOCP) 1.4.001 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.
|
[] | null | null | null | null | null |
|
GHSA-mc9w-c56j-233f
|
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service.
|
[] | null | null | null | null | null |
|
RHSA-2016:2822
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite security update
|
XStream: enabled processing of external entities Workbench: Path traversal vulnerability Stored XSS in business process editor
|
[
"cpe:/a:redhat:jboss_bpms:6.3"
] | null | null | 5.4 | null | null |
GHSA-fpvq-32pp-84f9
|
On install, Dell Encryption versions prior 10.0.1 and Dell Endpoint Security Suite Enterprise versions prior 2.0.1 will overwrite and manually set the "Minimum Password Length" group policy object to a value of 1 on that device. This allows for users to bypass any existing policy for password length and potentially create insecure password on their device. This value is defined during the installation of the "Encryption Management Agent" or "EMAgent" application. There are no other known values modified.
|
[] | null | null | 7.5 | null | null |
|
GHSA-pqm2-rcwc-h6q3
|
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into clicking on a malicious link.
|
[] | null | null | 6.1 | null | null |
|
GHSA-9m6m-33c2-g88x
|
Quake3e < 5ed740d is affected by: Buffer Overflow. The impact is: Possible code execution and denial of service. The component is: Argument string creation.
|
[] | null | null | 9.8 | null | null |
|
GHSA-v2xr-whr4-9p35
|
Dell AppSync, version(s) 4.6.0.0, contains an Improper Restriction of XML External Entity Reference vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure and Information tampering.
|
[] | null | 4.2 | null | null | null |
|
GHSA-xjwx-qg8w-3x9p
|
Multiple directory traversal vulnerabilities in vtiger CRM 5.0.4 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the module parameter to graph.php; or the (2) module or (3) file parameter to include/Ajax/CommonAjax.php, reachable through modules/Campaigns/CampaignsAjax.php, modules/SalesOrder/SalesOrderAjax.php, modules/System/SystemAjax.php, modules/Products/ProductsAjax.php, modules/uploads/uploadsAjax.php, modules/Dashboard/DashboardAjax.php, modules/Potentials/PotentialsAjax.php, modules/Notes/NotesAjax.php, modules/Faq/FaqAjax.php, modules/Quotes/QuotesAjax.php, modules/Utilities/UtilitiesAjax.php, modules/Calendar/ActivityAjax.php, modules/Calendar/CalendarAjax.php, modules/PurchaseOrder/PurchaseOrderAjax.php, modules/HelpDesk/HelpDeskAjax.php, modules/Invoice/InvoiceAjax.php, modules/Accounts/AccountsAjax.php, modules/Reports/ReportsAjax.php, modules/Contacts/ContactsAjax.php, and modules/Portal/PortalAjax.php; and allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the step parameter in an Import action to the (4) Accounts, (5) Contacts, (6) HelpDesk, (7) Leads, (8) Potentials, (9) Products, or (10) Vendors module, reachable through index.php and related to modules/Import/index.php and multiple Import.php files.
|
[] | null | null | null | null | null |
|
CVE-2025-43966
|
libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden in image-items/iden.cc.
|
[] | null | 2.9 | null | null | null |
|
GHSA-wpg9-vg72-4v62
|
In JetBrains IntelliJ IDEA before 2022.1 HTML injection into IDE messages was possible
|
[] | null | 3.3 | null | null | null |
|
GHSA-rc52-2qp6-xmff
|
Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3
|
[] | null | 5.3 | null | null | null |
|
GHSA-h8vc-v44p-5r2q
|
Moodle provides calendar-event data without considering whether an activity is hidden
|
calendar/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 provides calendar-event data without considering whether an activity is hidden, which allows remote authenticated users to obtain sensitive information via a web-service request.
|
[] | null | null | 4.3 | null | null |
GHSA-wwm3-cpmm-rjmw
|
Multiple cross-site scripting (XSS) vulnerabilities in jce.php in the JCE Admin Component in Ryan Demmer Joomla Content Editor (JCE) 1.1.0 beta 2 and earlier for Joomla! (com_jce) allow remote attackers to inject arbitrary web script or HTML via the (1) img, (2) title, (3) w, or (4) h parameter, different vectors than CVE-2006-6166. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2023-39015
|
webmagic-extension v0.9.0 and below was discovered to contain a code injection vulnerability via the component us.codecraft.webmagic.downloader.PhantomJSDownloader.
|
[
"cpe:2.3:a:code4craft:webmagic:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-rxx7-mqqx-phw8
|
sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.
|
[] | null | null | 6.1 | null | null |
|
CVE-2008-6171
|
includes/bootstrap.inc in Drupal 5.x before 5.12 and 6.x before 6.6, when the server is configured for "IP-based virtual hosts," allows remote attackers to include and execute arbitrary files via the HTTP Host header.
|
[
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2023-1956
|
SourceCodester Online Computer and Laptop Store Image path traversal
|
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_img of the component Image Handler. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225343.
|
[
"cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | 5.4 | 5.5 | null |
CVE-2018-12213
|
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
|
[
"cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*"
] | null | null | 6 | 2.1 | null |
|
CVE-2025-47593
|
WordPress Really Simple Under Construction Page <= 1.4.6 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jonas Hjalmarsson Really Simple Under Construction Page allows Stored XSS. This issue affects Really Simple Under Construction Page: from n/a through 1.4.6.
|
[] | null | 5.9 | null | null | null |
GHSA-92cm-c6mv-gcx5
|
read.cgi in GlobalNoteScript allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameters.
|
[] | null | null | null | null | null |
|
GHSA-v28c-957v-55vg
|
Sourcecodester Employee Task Management System v1.0 is vulnerable to SQL Injection via admin-manage-user.php.
|
[] | null | 8.8 | null | null | null |
|
CVE-2017-1099
|
IBM Jazz Foundation could expose potentially sensitive information to authenticated users through stack trace error conditions. IBM X-Force ID: 120659.
|
[
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.3:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
CVE-2023-5350
|
SQL Injection in salesagility/suitecrm
|
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1.
|
[
"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
GHSA-gf33-7q5r-4rpx
|
RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add an administrator account.
|
[] | null | 8.8 | null | null | null |
|
GHSA-xpm5-2pgw-v7g9
|
The Download Manager WordPress plugin before 3.2.34 does not sanitise and escape the package_ids parameter before using it in a SQL statement, leading to a SQL injection, which can also be exploited to cause a Reflected Cross-Site Scripting issue
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-36051
|
Directory traversal vulnerability in page_edit.php in MiniCMS V1.10 allows remote attackers to read arbitrary files via the state parameter.
|
[
"cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2017-15856
|
Due to a race condition while processing the power stats debug file to read status, a double free condition can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7 | 4.4 | null |
|
CVE-2015-6993
|
FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-36124
|
iq80 Snappy has an out-of-bounds read when uncompressing data, leading to JVM crash
|
iq80 Snappy is a compression/decompression library. When uncompressing certain data, Snappy tries to read outside the bounds of the given byte arrays. Because Snappy uses the JDK class `sun.misc.Unsafe` to speed up memory access, no additional bounds checks are performed and this has similar security consequences as out-of-bounds access in C or C++, namely it can lead to non-deterministic behavior or crash the JVM. iq80 Snappy is not actively maintained anymore. As quick fix users can upgrade to version 0.5.
|
[
"cpe:2.3:a:xerial:snappy-java:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-qcrp-3q6q-67w2
|
The software update mechanism as used in Bare Bones Software Yojimbo before 4.0, TextWrangler before 4.5.3, and BBEdit before 10.5.5 does not properly download and verify updates before installation, which allows attackers to perform "tampering or corruption" of the updates.
|
[] | null | null | null | null | null |
|
GHSA-q2gr-rg5x-jm99
|
Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.31), 8.1 and 8.2 before 8.2(5.38), 8.3 before 8.3(2.37), 8.4 before 8.4(5), 8.5 before 8.5(1.17), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3) allow remote attackers to cause a denial of service (device reload) via a crafted certificate, aka Bug ID CSCuc72408.
|
[] | null | null | null | null | null |
|
CVE-2025-5113
|
Authenticated Remote Command Injection in Diviotec NBR IP Cameras
|
The Diviotec professional series exposes a web interface. One endpoint is vulnerable to arbitrary command injection and hardcoded passwords are used.
|
[] | 8.6 | null | null | null | null |
GHSA-39xp-m58q-6r58
|
"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition.
Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure ? versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
|
[] | null | 3.3 | null | null | null |
|
ICSA-19-078-02
|
Columbia Weather Systems MicroServer
|
A cross-site scripting error exists that does not properly validate input, which may allow arbitrary web script to be executed.CVE-2018-18875 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). A path traversal vulnerability exists that could allow an attacker read access to files within the directory structure of the target device.CVE-2018-18876 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). An improper authentication vulnerability exists that could allow a possible authentication bypass, allowing an attacker to manipulate the device and cause a denial-of-service condition.CVE-2018-18877 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An improper input validation vulnerability exists allowing an attacker to craft the input in a form that is not expected by the rest of the application, causing a denial-of-service condition and the device to become unavailable.CVE-2018-18878 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). A code injection vulnerability exists that could allow remote code execution.CVE-2018-18879 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A cross-site scripting error exists that does not properly validate input, which may allow arbitrary web script to be executed.CVE-2018-18880 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
|
[] | null | null | 7.3 | null | null |
CVE-2014-5405
|
Hospira MedNet before 6.1 uses a hardcoded cleartext password to control SQL database authorization, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
|
[
"cpe:2.3:a:hospira:mednet:*:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
GHSA-4w5r-2wjg-hq97
|
Vulnerability in the PeopleSoft Enterprise ELM component of Oracle PeopleSoft Products (subcomponent: Enterprise Learning Mgmt). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise ELM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise ELM accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | null | null | null | null |
|
RHSA-2024:7977
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null | null |
GHSA-4g29-fccr-p59w
|
Reflected Cross-site Scripting in Shopware storefront
|
ImpactNot-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
[] | null | 5.4 | null | null | null |
CVE-2022-29777
|
Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a heap overflow via the component DesktopEditor/fontengine/fontconverter/FontFileBase.h.
|
[
"cpe:2.3:a:onlyoffice:core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:onlyoffice:document_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-3x3g-jj7x-gr2f
|
KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
|
[] | null | null | 7.8 | null | null |
|
GHSA-5wvh-rjrr-cgr4
|
Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate privileges.
|
[] | null | 8.8 | null | null | null |
|
GHSA-q59j-r89m-6v8h
|
Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.
|
[] | null | null | null | null | null |
|
cisco-sa-ise-priv-esc-fNZX8hHj
|
Cisco Identity Services Engine Privilege Escalation Vulnerability
|
A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device.
The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Note: Only devices that have the CLI configured to support Active Directory authentication are affected by this vulnerability. CLI support for Active Directory authentication is disabled by default. All other uses of Active Directory Domain Services or Active Directory Certificate Services within ISE are not affected.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj"]
|
[] | null | null | 4.4 | null | null |
GHSA-rw53-q8x7-ccx8
|
Malicious Package in buffer-xkr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised.
|
[] | null | 9.8 | null | null | null |
GHSA-fjf4-cc29-rvfv
|
IBM QRadar 7.2 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM Reference #: 1999545.
|
[] | null | null | 6.5 | null | null |
|
CVE-2012-0808
|
as31 2.3.1-4 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack.
|
[
"cpe:2.3:a:bdale_garbee:as31:2.3.1-4:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
CVE-2024-56195
|
Apache Traffic Server: Intercept plugins are not access controlled
|
Improper Access Control vulnerability in Apache Traffic Server.
This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.
Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
|
[] | null | 6.3 | null | null | null |
CVE-2011-10012
|
NetOp Remote Control Client 9.5 .dws File Buffer Overflow
|
NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened.
|
[] | 8.4 | null | null | null | null |
GHSA-53mq-ph34-h4jf
|
The Cost Calculator Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_ids’ parameter in all versions up to, and including, 3.2.67 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 6.5 | null | null | null |
|
GHSA-v49w-8x46-rgr6
|
SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service, resulting in remote code execution.
|
[] | null | 8 | null | null | null |
|
GHSA-89jm-fpx3-9h4r
|
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
|
[] | null | null | 6.1 | null | null |
|
cisco-sa-staros-file-read-L3RDvtey
|
Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability
|
A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the affected device.
The vulnerability is due to insecure handling of symbolic links. An attacker could exploit this vulnerability by sending a crafted SFTP command to an affected device. A successful exploit could allow the attacker to read arbitrary files on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-file-read-L3RDvtey ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-file-read-L3RDvtey"]
|
[] | null | 6.5 | null | null | null |
CVE-2019-1299
|
An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory, aka 'Microsoft Edge based on Edge HTML Information Disclosure Vulnerability'.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
RHSA-2024:8679
|
Red Hat Security Advisory: podman security update
|
buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null | null |
CVE-2024-3801
|
XSS in S@M CMS
|
Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS via including scripts in one of GET header parameters.
Only a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears.
|
[
"cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-jqgh-w22q-m24f
|
An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The verification token used for sending SMS through a goTenna server is hardcoded in the app.
|
[] | null | 7.3 | null | null | null |
|
CVE-2018-17049
|
CQU-LANKERS through 2017-11-02 has XSS via the public/api.php callback parameter in an uploadpic action.
|
[
"cpe:2.3:a:cqu_lankers_project:cqu_lankers:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2022-45113
|
Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
|
[
"cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:*",
"cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium_advanced:*:*:*",
"cpe:2.3:a:sixapart:movable_type:*:*:*:*:-:*:*:*",
"cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2022:6351
|
Red Hat Security Advisory: OpenShift Virtualization 4.10.5 Images security and bug fix update
|
kubeVirt: Arbitrary file read on the host from KubeVirt VMs go-restful: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 9.1 | null | null | null |
GHSA-w463-hpv4-95pw
|
Multiple SQL Injection vulnerabilities in Teachers Record Management System 1.0 allow remote authenticated users to execute arbitrary SQL commands via the 'editid' GET parameter in edit-subjects-detail.php, edit-teacher-detail.php, or the 'searchdata' POST parameter in search.php.
|
[] | null | 8.8 | null | null | null |
|
GHSA-5h74-rc34-8rh3
|
A vulnerability classified as critical has been found in zj1983 zz up to 2024-08. Affected is the function GetUserOrg of the file com/futvan/z/framework/core/SuperZ.java. The manipulation of the argument userId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-7xgr-cxmr-5q3f
|
Microsoft Silverlight 3 before 3.0.50611.0 on Windows, and before 3.0.41130.0 on Mac OS X, does not properly handle pointers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and framework outage) via a crafted web site, aka "Microsoft Silverlight Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-2hfw-w739-p7x5
|
nano-id reduced entropy due to inadequate character set usage
|
DescriptionAffected versions of the nano-id crate incorrectly generated IDs using a reduced character set in the `nano_id::base62` and `nano_id::base58` functions. Specifically, the `base62` function used a character set of 32 symbols instead of the intended 62 symbols, and the `base58` function used a character set of 16 symbols instead of the intended 58 symbols. Additionally, the `nano_id::gen` macro is also affected when a custom character set that is not a power of 2 in size is specified.It should be noted that `nano_id::base64` is not affected by this vulnerability.ImpactThis can result in a significant reduction in entropy, making the generated IDs predictable and vulnerable to brute-force attacks when the IDs are used in security-sensitive contexts such as session tokens or unique identifiers.PatchesThe flaws were corrected in commit [a9022772b2f1ce38929b5b81eccc670ac9d3ab23](https://github.com/viz-rs/nano-id/commit/a9022772b2f1ce38929b5b81eccc670ac9d3ab23) by updating the the `nano_id::gen` macro to use all specified characters correctly.PoC
|
[] | null | 9.4 | null | null | null |
CVE-2019-13273
|
In Xymon through 4.3.28, a buffer overflow vulnerability exists in the csvinfo CGI script. The overflow may be exploited by sending a crafted GET request that triggers an sprintf of the srcdb parameter.
|
[
"cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-g9xm-g3q5-pm76
|
lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
|
[] | null | null | null | null | null |
|
CVE-2005-3316
|
The installation of ON Symantec Discovery 4.5.x and Symantec Discovery 6.0 creates the (1) DiscoveryWeb and (2) DiscoveryRO database accounts with null passwords, which could allow attackers to gain privileges or prevent Discovery from running by setting another password.
|
[
"cpe:2.3:a:symantec:discovery:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:on_command_discovery:standard_4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:on_command_discovery:web_4.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-1000211
|
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
|
[
"cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2017-20074
|
Hindu Matrimonial Script newsletter1.php privileges management
|
A vulnerability was found in Hindu Matrimonial Script and classified as critical. Affected by this issue is some unknown functionality of the file /admin/newsletter1.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-h9vw-8pf3-5j78
|
A vulnerability classified as critical was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. Affected by this vulnerability is the function sub_40BE30 of the file /boafrm/formStats of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2022-22110
|
DayByDay CRM - Weak Password Requirements in Update User
|
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
|
[
"cpe:2.3:a:daybydaycrm:daybyday_crm:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-wx6g-rg4g-cr55
|
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only).
|
[] | null | 8.5 | null | null | null |
|
CVE-2025-21511
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:prior_to_9.2.9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2021:0980
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.5 security and bug fix update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:acm:2.1::el8"
] | null | 7.5 | null | null | null |
GHSA-hqvv-x2xp-chxw
|
Microsoft Defender for IoT Elevation of Privilege Vulnerability
|
[] | null | 6.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.