id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-x652-w4xg-69jh
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: MGMT: Fix possible crash on mgmt_index_removedIf mgmt_index_removed is called while there are commands queued on
cmd_sync it could lead to crashes like the bellow trace:0x0000053D: __list_del_entry_valid_or_report+0x98/0xdc
0x0000053D: mgmt_pending_remove+0x18/0x58 [bluetooth]
0x0000053E: mgmt_remove_adv_monitor_complete+0x80/0x108 [bluetooth]
0x0000053E: hci_cmd_sync_work+0xbc/0x164 [bluetooth]So while handling mgmt_index_removed this attempts to dequeue
commands passed as user_data to cmd_sync.
|
[] | null | 5.5 | null | null | null |
|
CVE-2012-0698
|
tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003.
|
[
"cpe:2.3:a:trustedcomputinggroup:trousers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.8:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-c36x-3g67-vmf5
|
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
|
[] | null | 8.4 | null | null | null |
|
CVE-2014-9513
|
Insecure use of temporary files in xbindkeys-config 0.1.3-2 allows remote attackers to execute arbitrary code.
|
[
"cpe:2.3:a:debian:xbindkeys-config:0.1.3-2:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2017-6687
|
A vulnerability in Cisco Ultra Services Framework Element Manager could allow an authenticated, remote attacker with access to the management network to log in to the affected device using default credentials present on the system, aka an Insecure Default Password Vulnerability. More Information: CSCvc76695. Known Affected Releases: 21.0.0.
|
[
"cpe:2.3:a:cisco:ultra_services_framework_element_manager:21.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2023-32830
|
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.
|
[
"cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2008-6841
|
PHP remote file inclusion vulnerability in the Green Mountain Information Technology and Consulting Database Query (com_dbquery) component 1.4.1.1 and earlier for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to classes/DBQ/admin/common.class.php.
|
[
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gmitc:com_dbquery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gmitc:com_dbquery:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-67qg-fr69-72wp
|
Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.
|
[] | null | null | null | null | null |
|
GHSA-p2qh-598h-6m3x
|
There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution.
|
[] | null | 9.8 | null | null | null |
|
GHSA-frh4-4pfg-65vw
|
The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-4147
|
Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free
|
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos",
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 7.8 | null | null | null |
CVE-2020-14851
|
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-9v87-664x-72qc
|
An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
|
[] | null | null | null | null | null |
|
CVE-2008-0495
|
Unspecified vulnerability in the Pegasus CIM Server in IBM Hardware Management Console (HMC) 7 R3.2.0 allows remote attackers to cause a denial of service via unspecified vectors.
|
[
"cpe:2.3:a:ibm:hardware_management_console:7.3.2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2014-1554
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-p79f-j3f9-3h94
|
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0901 and CVE-2018-0926.
|
[] | null | null | 4.7 | null | null |
|
GHSA-j879-hg9w-v5qv
|
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
|
[] | null | null | null | null | null |
|
GHSA-88j4-pcx8-q4q3
|
Password Change Vulnerability
|
Overview:A moderate security vulnerability has been identified in Uptime Kuma platform that poses a significant threat to the confidentiality and integrity of user accounts.
When a user changes their login password in Uptime Kuma, a previously logged-in user retains access without being logged out.
This behaviour persists consistently, even after system restarts or browser restarts.
This vulnerability allows unauthorized access to user accounts, compromising the security of sensitive information.The same vulnerability was partially fixed in https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g but logging existing users out of their accounts was forgotten.Impact:The impact of this vulnerability is moderate, as it enables attackers or unauthorized individuals to maintain access to user accounts even after the account password has been changed. This can lead to unauthorized data access, manipulation, or compromise of user accounts, posing a threat to the integrity and confidentiality of Uptime Kuma.
A better impact-analysis is included in https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99gPoCChange the password for a user accountAccess the platform using the previously logged-in account without logging outNote that access (read-write) remains despite the password changeExpected behaviour:
After changing the password for a user account, all previously logged-in sessions should be invalidated, requiring users to log in again with the updated credentials.Actual behaviour:
The system retains sessions and never logs out users unless explicitly done by clicking logout.Remediation:To mitigate the risks associated with this vulnerability, we made the server emit a `refresh` event (clients handle this by reloading) and then disconnecting all clients except the one initiating the password change.It is recommended to Update Uptime Kuma to `>= 1.23.9`.Timeline:|Date|Event|
|--|--|
|2023-12-07 14:35 UTC| @manoonabbasi discovered and posts this information as a `bug`-report in issue #4188 [^1] into our **public issue tracker**, which is [**against our security policy**](https://github.com/louislam/uptime-kuma/security/policy) |
| 2023-12-07 16:50 UTC | The Uptime Kuma team deleted the post in our issue tracker |
| 2023-12-10 18:10 UTC | Uptime Kuma team released patch and this Advisory |[^1]: deleted to prevent the spread of this vulnerability without there being a fix available
|
[] | null | 6.7 | null | null | null |
GHSA-5mrv-fmm3-qm6f
|
Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, possibly 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995.
|
[] | null | null | null | null | null |
|
GHSA-2955-fpjj-xgjj
|
The SNMP module in Cisco IOS XR allows remote authenticated users to cause a denial of service (process restart) via crafted SNMP packets, aka Bug ID CSCue69472.
|
[] | null | null | null | null | null |
|
GHSA-rr25-rmv3-92rm
|
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.
|
[] | null | 7.8 | null | null | null |
|
CVE-2016-9627
|
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
|
[
"cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2008-2867
|
SQL injection vulnerability in adclick.php in E-topbiz Viral DX 1 2.07 allows remote attackers to execute arbitrary SQL commands via the bannerid parameter.
|
[
"cpe:2.3:a:e-topbiz:viral_dx_1:2.07:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-2190
|
In LG's LAF component, there is a possible leak of information in a protected disk partition due to a missing bounds check. This could lead to local information disclosure via USB with User execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-68771598
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 2.1 | null |
|
GHSA-3887-hqfw-78p7
|
An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
|
[] | null | null | 8.8 | null | null |
|
GHSA-669q-4gjm-8895
|
Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function fromDhcpListClient with a combined parameter "list*" ("%s%d","list").
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-3630
|
Linux Kernel IPsec cookie.c memory leak
|
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
GHSA-mv75-h3qp-gpmf
|
Net-SNMP 5.7.1 and earlier, when AgentX is registering to handle a MIB and processing GETNEXT requests, allows remote attackers to cause a denial of service (crash or infinite loop, CPU consumption, and hang) by causing the AgentX subagent to timeout.
|
[] | null | null | null | null | null |
|
GHSA-xv69-6rf3-w5g2
|
Missing permission check in Jenkins Cloud Statistics Plugin
|
Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.Jenkins Cloud Statistics Plugin 0.27 requires Overall/Administer permission to access provisioning exception error messages.
|
[] | null | 4.3 | null | null | null |
GHSA-pf8f-jj2r-7pj2
|
Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking an user to open a crafted malicious docker-desktop:// URL.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-10842
|
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (S.LSI chipsets) software. There is a heap out-of-bounds write in the tsmux driver. The Samsung ID is SVE-2019-16295 (February 2020).
|
[
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2023-24317
|
Judging Management System 1.0 was discovered to contain an arbitrary file upload vulnerability via the component edit_organizer.php.
|
[
"cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-qpw4-52v6-qh2v
|
In IKARUS anti.virus 2.16.20, the driver file (ntguard.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83000084.
|
[] | null | null | 7.8 | null | null |
|
CVE-2014-3104
|
IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
|
[
"cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2017-9957
|
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the web service contains a hidden system account with a hardcoded password. An attacker can use this information to log into the system with high-privilege credentials.
|
[
"cpe:2.3:a:schneider-electric:u.motion_builder:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
RHSA-2023:6059
|
Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.12.1 release and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_pipelines:1.12::el8"
] | null | 7.5 | null | null | null |
GHSA-gxcf-fvmv-78f7
|
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.
|
[] | null | 3.3 | null | null | null |
|
CVE-2023-23800
|
WordPress Shortcodes Ultimate Plugin <= 5.12.6 is vulnerable to Server Side Request Forgery (SSRF)
|
Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes Plugin — Shortcodes Ultimate.This issue affects WP Shortcodes Plugin — Shortcodes Ultimate: from n/a through 5.12.6.
|
[
"cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
GHSA-622v-p4vm-qvmm
|
FastStone Image Viewer 6.2 has a "Data from Faulting Address may be used as a return value" issue. This issue can be triggered by a malformed JPEG 2000 file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
|
[] | null | null | 7.8 | null | null |
|
GHSA-pcqr-p6gc-4ch6
|
Cross-site scripting (XSS) vulnerability in hb.cgi in Nishishi Factory Fumy News Clipper 2.x before 2.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-cwv2-77rj-p78r
|
Cross-site scripting (XSS) vulnerability in the Keyword Search page in the web interface in Pattern Insight 2.3 allows remote attackers to inject arbitrary web script or HTML via crafted characters that are not properly handled during construction of error messages.
|
[] | null | null | null | null | null |
|
GHSA-w68j-67vx-j26g
|
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution.
|
[] | null | 9.8 | null | null | null |
|
GHSA-gjjx-gqm4-wcgm
|
Uncontrolled Resource Consumption in Undertow
|
It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.
|
[] | null | null | 6.5 | null | null |
GHSA-5vph-wh8h-x2qx
|
TRENDnet TEW-827DRU devices through 2.06B04 contain multiple command injections in apply.cgi via the action send_log_email with the key auth_acname (or auth_passwd), allowing an authenticated user to run arbitrary commands on the device.
|
[] | null | null | null | null | null |
|
GHSA-cm97-fwp9-pfjj
|
On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly StopCovid). As part of the pairing process, two pieces (among others) of personally identifiable information are exchanged: the Identity Address of the Bluetooth adapter of the target device, and its associated Identity Resolving Key (IRK). Either one of these identifiers can be used to perform re-identification of the target device for long term tracking. The list of affected devices includes (but is not limited to): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4, and Galaxy S5.
|
[] | null | null | null | null | null |
|
GHSA-6x59-f29p-7vf6
|
SQL injection vulnerability in index.php in AlstraSoft EPay Pro 2.0 allows remote attackers to execute arbitrary SQL commands via the pmodule parameter.
|
[] | null | null | null | null | null |
|
GHSA-vjrm-cmpj-5xfq
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-39958
|
Missing brute force protection on password reset token OAuth2 API controller
|
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
|
[
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*"
] | null | 5.8 | null | null | null |
GHSA-8xpm-cgfj-j3pr
|
A SQL injection vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can use calls to various paths allowing performance of arbitrary SQL commands against the underlying database.
|
[] | null | null | 9.8 | null | null |
|
GHSA-2v77-vf4r-42vf
|
An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-h23q-pvx6-9jxr
|
An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC 7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.
|
[] | null | 7.8 | null | null | null |
|
GHSA-h683-w4pg-75rh
|
Snort 1.8.3 does not properly define the minimum ICMP header size, which allows remote attackers to cause a denial of service (crash and core dump) via a malformed ICMP packet.
|
[] | null | null | null | null | null |
|
CVE-2012-5329
|
Buffer overflow in TYPSoft FTP Server 1.1 allows remote authenticated users to cause a denial of service (application crash) via a long string in an APPE command.
|
[
"cpe:2.3:a:typsoft:typsoft_ftp_server:1.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2007-4065
|
lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.
|
[
"cpe:2.3:a:xiph.org:libvorbis:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2003-0969
|
mpg321 0.2.10 allows remote attackers to overwrite memory and possibly execute arbitrary code via an mp3 file that passes certain strings to the printf function, possibly triggering a format string vulnerability.
|
[
"cpe:2.3:a:mpg321:mpg321:0.2.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-cjg4-c2hx-54x2
|
The Core Tweaks WP Setup WordPress plugin through 4.1 allows to bulk-set many settings in WordPress, including the admin email, as well as creating a new admin account. There is no CSRF protection in place, allowing an attacker to arbitrary change the admin email or create another admin account and takeover the website via CSRF attacks
|
[] | null | null | null | null | null |
|
CVE-2017-3643
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
CVE-2016-1209
|
The Ninja Forms plugin before 2.9.42.1 for WordPress allows remote attackers to conduct PHP object injection attacks via crafted serialized values in a POST request.
|
[
"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2019-5216
|
There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code.
|
[
"cpe:2.3:o:huawei:honor_view_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_view_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_play_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_play:-:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 | null |
|
CVE-2024-50717
|
SQL injection vulnerability in Smart Agent v.1.1.0 allows a remote attacker to execute arbitrary code via the client parameter in the /recuperaLog.php component.
|
[] | null | 9.8 | null | null | null |
|
GHSA-cc65-g7w9-pcjx
|
Akiva WebBoard 8.x stores passwords in plaintext, which allows local users to obtain sensitive information by reading from the database.
|
[] | null | null | null | null | null |
|
CVE-2024-56776
|
drm/sti: avoid potential dereference of error pointers
|
In the Linux kernel, the following vulnerability has been resolved:
drm/sti: avoid potential dereference of error pointers
The return value of drm_atomic_get_crtc_state() needs to be
checked. To avoid use of error pointer 'crtc_state' in case
of the failure.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-f4vh-cc5j-94gx
|
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine NetFlow Analyzer 5 allow remote attackers to inject arbitrary web script or HTML via the (1) alpha parameter in (a) netflow/jspui/applicationList.jsp, the (2) task parameter in (b) netflow/jspui/appConfig.jsp, the (3) view parameter in (c) netflow/jspui/index.jsp, and the (4) rtype parameter in (d) netflow/jspui/selectDevice.jsp and (e) netflow/jspui/customReport.jsp. NOTE: it was later reported that vector 3 also affects 7.5 build 7500.
|
[] | null | null | null | null | null |
|
ICSMA-20-170-02
|
Baxter PrismaFlex and PrisMax (Update B)
|
The affected devices do not implement data-in-transit encryption (e.g., TLS/SSL) when configured to send treatment data to a PDMS (Patient Data Management System) or an EMR (Electronic Medical Record) system. An attacker could observe sensitive data sent from the device.CVE-2020-12036 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The affected devices do not require authentication when configured to send treatment data to a PDMS or an EMR system. This could allow an attacker to modify treatment status information.CVE-2020-12035 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L). The PrismaFlex device contains a hard-coded service password that provides access to biomedical information, device settings, calibration settings, and network configuration. This could allow an attacker to modify device settings and calibration.CVE-2020-12037 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
|
[] | null | null | 5.4 | null | null |
GHSA-c9fp-cj2q-cv72
|
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
|
[] | null | 5.5 | null | null | null |
|
GHSA-2gm3-gg3v-jmmf
|
Cross-site scripting (XSS) vulnerability in WebTrends allows remote attackers to inject arbitrary web script or HTML via a crafted client domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
|
[] | null | null | null | null | null |
|
CVE-2019-12117
|
An issue was discovered in ONAP SDC through Dublin. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
|
[
"cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-g774-vx5r-x2vg
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information.
|
[] | null | 3.3 | null | null | null |
|
GHSA-3p24-p4jg-q3pq
|
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (with TEEGRIS) software. The Esecomm Trustlet allows a stack overflow and arbitrary code execution. The Samsung ID is SVE-2019-15984 (February 2020).
|
[] | null | null | null | null | null |
|
CVE-2020-7830
|
RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier.
|
[
"cpe:2.3:a:raonwiz:raon_kupload:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-69gr-h4f7-x89q
|
IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0, when external Enterprise Content Management (ECM) integration is enabled with a certain technical system account configuration, allows remote authenticated users to bypass intended document-access restrictions via a (1) upload or (2) download action.
|
[] | null | null | null | null | null |
|
RHSA-2021:2106
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null | null |
GHSA-6cgm-wfj9-r7xv
|
Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data. CVSS v3.0 Base Score 4.7 (Integrity impacts).
|
[] | null | null | 4.7 | null | null |
|
GHSA-fvrm-4gj8-jr73
|
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.
|
[] | null | null | null | null | null |
|
CVE-2025-31463
|
WordPress TGG WP Optimizer <= 1.22 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Preetinder Singh TGG WP Optimizer allows Stored XSS. This issue affects TGG WP Optimizer: from n/a through 1.22.
|
[] | null | 5.9 | null | null | null |
GHSA-fgx6-cf44-r3h2
|
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hj95-cvvq-rc83
|
Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability."
|
[] | null | 8.8 | null | null | null |
|
GHSA-xrfp-wpx5-pg4h
|
When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.
|
[] | null | 9.1 | null | null | null |
|
CVE-2008-7290
|
Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
|
[
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-w395-jm45-w9cj
|
IceWarp Mail Server v10.4.5 was discovered to contain a local file inclusion (LFI) vulnerability via the component /calendar/minimizer/index.php. This vulnerability allows attackers to include or execute files from the local file system of the targeted server.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-17898
|
Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information.
|
[
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:6.0.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2020:1523
|
Red Hat Security Advisory: rh-maven35-jackson-databind security update
|
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null | null |
GHSA-m5hx-gg5v-rcw7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom Page Extensions allows Reflected XSS. This issue affects Custom Page Extensions: from n/a through 0.6.
|
[] | null | 7.1 | null | null | null |
|
GHSA-78f8-4pfr-6r63
|
GoPro GPMF-parser 1.2.2 has a heap-based buffer over-read (4 bytes) in GPMF_Next in GPMF_parser.c.
|
[] | null | null | 6.5 | null | null |
|
GHSA-39p4-wghg-36vf
|
In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
|
[] | null | null | null | null | null |
|
GHSA-g7qc-77mr-f9fj
|
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
|
[] | null | null | null | null | null |
|
CVE-2024-53173
|
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
|
In the Linux kernel, the following vulnerability has been resolved:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
Yang Erkun reports that when two threads are opening files at the same
time, and are forced to abort before a reply is seen, then the call to
nfs_release_seqid() in nfs4_opendata_free() can result in a
use-after-free of the pointer to the defunct rpc task of the other
thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.
|
[] | null | 7.8 | null | null | null |
CVE-2019-2780
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Components / Services). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
GHSA-chj8-5xgw-wcvj
|
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
|
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
|
[] | null | null | 6.5 | null | null |
CVE-2024-13417
|
Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state.
2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.
|
[] | null | 4.6 | null | null | null |
|
GHSA-hgrv-3v95-j3cm
|
The Abram Radio Groove! (aka com.nobexinc.wls_79226887.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-7rwx-5c38-47x9
|
Cross-site scripting (XSS) vulnerability in status_image.php in PHP Live! 3.0 allows remote attackers to inject arbitrary web script or HTML via the base_url parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-28473
|
Web Cache Poisoning
|
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
|
[
"cpe:2.3:a:bottlepy:bottle:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
RHSA-2021:2353
|
Red Hat Security Advisory: .NET 5.0 security and bugfix update
|
dotnet: ASP.NET Core Client Disconnect Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null | null |
GHSA-5r5q-946x-3wrf
|
The Activism module 6.x-2.x before 6.x-2.1 for Drupal does not properly restrict access to the "Campaign" content type, which might allow remote attackers to bypass access restrictions and possibly have other unspecified impact.
|
[] | null | null | null | null | null |
|
RHSA-2020:2085
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.9 | null | null | null |
GHSA-355v-2rjx-fpx7
|
Inefficient Regular Expression Complexity in langflow
|
A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \src\backend\base\langflow\interface\utils.py of the component HTTP POST Request Handler. The manipulation of the argument remaining_text leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 3.5 | null | null | null |
CVE-2018-12319
|
Denial-of-service in the login page of ASUSTOR ADM 3.1.1 allows attackers to prevent users from signing in by placing malformed text in the title.
|
[
"cpe:2.3:o:asustor:data_master:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asustor:as602t:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-8qm3-5x8f-7qqj
|
The HTTP handlers in BEA WebLogic Server 9.0, 8.1 up to SP5, 7.0 up to SP6, and 6.1 up to SP7 stores the username and password in cleartext in the WebLogic Server log when access to a web application or protected JWS fails, which allows attackers to gain privileges.
|
[] | null | null | null | null | null |
|
GHSA-g98v-rw9m-98w8
|
Directory traversal vulnerability in KeyFocus web server 1.0.8 allows remote attackers to read arbitrary files for recognized MIME type files via "...", "....", ".....", and other multiple dot sequences.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.