id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-p4vm-jv89-q82f
|
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0920, CVE-2020-0929, CVE-2020-0932, CVE-2020-0971, CVE-2020-0974.
|
[] | null | null | null | null | null |
|
GHSA-9hwx-82rg-g37j
|
Multiple directory traversal vulnerabilities in Nilson's Blogger 0.11 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the permalink parameter in core.php, accessed through index.php; and (2) the thispost parameter in comments.php.
|
[] | null | null | null | null | null |
|
CVE-2017-20073
|
Hindu Matrimonial Script cms.php privileges management
|
A vulnerability has been found in Hindu Matrimonial Script and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/cms.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-rfqx-fqvr-pgp7
|
Metinfo v6.0.0 allows remote attackers to write code into a .php file, and execute that code, via the module parameter to admin/column/save.php in an editor upload action.
|
[] | null | null | 7.2 | null | null |
|
GHSA-p5c5-45cp-hjw4
|
vim is vulnerable to Heap-based Buffer Overflow
|
[] | null | 8 | null | null | null |
|
CVE-2011-3155
|
Unspecified vulnerability in HP Onboard Administrator (OA) 3.21 through 3.31 allows remote attackers to bypass intended access restrictions via unknown vectors.
|
[
"cpe:2.3:a:hp:onboard_administrator:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:onboard_administrator:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:onboard_administrator:3.31:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-mggf-xr95-8r5v
|
Microsoft Exchange Server 2007 SP2 on the x64 platform allows remote authenticated users to cause a denial of service (infinite loop and MSExchangeIS outage) via a crafted RPC request, aka "Exchange Server Infinite Loop Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2019-17635
|
Eclipse Memory Analyzer version 1.9.1 and earlier is subject to a deserialization vulnerability if an index file of a parsed heap dump is replaced by a malicious version and the heap dump is reopened in Memory Analyzer. The user must chose to reopen an already parsed heap dump with an untrusted index for the problem to occur. The problem can be averted if the index files from an untrusted source are deleted and the heap dump is opened and reparsed. Also some local configuration data is subject to a deserialization vulnerability if the local data were to be replaced with a malicious version. This can be averted if the local configuration data stored on the file system cannot be changed by an attacker. The vulnerability could possibly allow code execution on the local system.
|
[
"cpe:2.3:a:eclipse:memory_analyzer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-3x3h-fcc9-p4px
|
An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.
|
[] | null | 3.5 | null | null | null |
|
CVE-2020-12876
|
Veritas APTARE versions prior to 10.4 allowed remote users to access several unintended files on the server. This vulnerability only impacts Windows server deployments.
|
[
"cpe:2.3:a:veritas:aptare:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2016-10310
|
Buffer overflow in the MobiLink Synchronization Server component in SAP SQL Anywhere 17 and possibly earlier allows remote authenticated users to cause a denial of service (resource consumption and process crash) by sending a crafted packet several times, aka SAP Security Note 2308778.
|
[
"cpe:2.3:a:sap:sql_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
CVE-2016-2360
|
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.
|
[
"cpe:2.3:o:milesight:ip_security_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:milesight:ip_security_camera:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 | null |
|
CVE-2018-9543
|
In trim_device of f2fs_format_utils.c, it is possible that the data partition is not wiped during a factory reset. This could lead to local information disclosure after factory reset with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112868088.
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
GHSA-m59f-q3cw-8cfh
|
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-0729
|
Use of Out-of-range Pointer Offset in vim/vim
|
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2013-2231
|
Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.
|
[
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.4.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2021-44492
|
An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, attackers can cause a type to be incorrectly initialized in the function f_incr in sr_port/f_incr.c and cause a crash due to a NULL pointer dereference.
|
[
"cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-7cx3-pgfh-r6h3
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-j44v-mmf2-xvm9
|
PDM Trojan Lockfile
|
SummaryIt's possible to craft a malicious `pdm.lock` file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project.DetailsProject `foo` can be targeted by creating the project `foo-2` and uploading the file `foo-2-2.tar.gz` to pypi.org. PyPI will see this as project `foo-2` version `2`, while PDM will see this as project `foo` version `2-2`. The version must only be [parseable as a version](https://github.com/frostming/unearth/blob/eca170d9370ac5032f2e497ee9b1b63823d3fe0f/src/unearth/evaluator.py#L215-L229) (and the filename must be a prefix of the project name), but it's [not verified to match the version being installed](https://github.com/pdm-project/pdm/blob/45d1dfa47d4900c14a31b9bb761e4c46eb5c9442/src/pdm/models/candidates.py#L98-L99). (Version `2-2` is also not a valid [normalized version per PEP 440](https://peps.python.org/pep-0440/#post-release-spelling).)Matching the project name exactly (not just prefix) would fix the issue. The version should also be verified to avoid version downgrade attacks.PoCExample `pdm.lock` snippet to appear to depend on `foo` but actually install `foo-2`ImpactWhen installing dependencies with PDM, what's actually installed could differ from what's listed in `pyproject.toml` (including arbitrary code execution on install). It could also be used for downgrade attacks by only changing the version.
|
[] | null | 7.8 | null | null | null |
GHSA-42g9-27rx-76cj
|
An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.
|
[] | null | 7.8 | null | null | null |
|
GHSA-hc7q-35jg-9p5m
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-6682.
|
[] | null | null | null | null | null |
|
GHSA-9gh5-vff3-cwrr
|
Multiple cross-site scripting (XSS) vulnerabilities in SQL-Ledger 2.8.24 allow remote authenticated users to inject arbitrary web script or HTML via (1) the DCN Description field in the Accounts Receivables menu item for Add Transaction, (2) the Description field in the Accounts Payable menu item for Add Transaction, or the name field in (3) the Customers menu item for Add Customer or (4) the Vendor menu item for Add Vendor.
|
[] | null | null | null | null | null |
|
GHSA-g82g-3hgj-8mgj
|
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
|
[] | null | 7.3 | null | null | null |
|
CVE-2023-33165
|
Microsoft SharePoint Server Security Feature Bypass Vulnerability
|
Microsoft SharePoint Server Security Feature Bypass Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-fjp3-vpjp-x9r6
|
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
GHSA-vp56-995c-wxvc
|
Microsoft Windows 9x operating systems allow an attacker to cause a denial of service via a pathname that includes file device names, aka the "DOS Device in Path Name" vulnerability.
|
[] | null | null | null | null | null |
|
GHSA-4ww8-fprq-cq34
|
Mattermost doesn't redact remote users' original email addresses
|
Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0, 9.8.x <= 9.8.2, when shared channels are enabled, fail to redact remote users' original email addresses stored in user props when email addresses are otherwise configured not to be visible in the local server.
|
[] | 5.3 | 4.3 | null | null | null |
CVE-2023-7078
|
Server-Side Request Forgery (SSRF) in Miniflare
|
Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.
|
[
"cpe:2.3:a:cloudflare:miniflare:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-3703
|
Carousel Slider < 2.2.10 - Editor+ Stored XSS
|
The Carousel Slider WordPress plugin before 2.2.10 does not validate and escape some of its Slide options before outputting them back in the page/post where the related Slide shortcode is embed, which could allow users with the Editor role and above to perform Stored Cross-Site Scripting attacks
|
[
"cpe:2.3:a:majeedraza:carousel_slider:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
CVE-2015-8832
|
Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.
|
[
"cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2015-6742
|
Basware Banking (Maksuliikenne) before 8.90.07.X uses a hardcoded password for the ANCO account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password. NOTE: this identifier was SPLIT from CVE-2015-0942 per ADT2 and ADT3 due to different vulnerability types and different affected versions.
|
[
"cpe:2.3:a:basware:banking:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-wfgq-222m-x2q7
|
The FOX – Currency Switcher Professional for WooCommerce plugin is vulnerable to Unauthenticated Arbitrary Shortcode Execution in versions up to, and including, 1.4.1.8. This allows unauthenticated attackers to execute arbitrary shortcodes. The severity and exploitability depends on what other plugins are installed and what shortcode functionality they provide.
|
[] | null | 6.5 | null | null | null |
|
GHSA-gh75-gghq-3c7w
|
TlNews 2.2 allows remote attackers to bypass authentication and gain administrative access by setting the tlNews_login cookie to admin.
|
[] | null | null | null | null | null |
|
RHSA-2023:5971
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (director-operator) security update
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null | null |
CVE-2008-0383
|
Multiple SQL injection vulnerabilities in MyBB 1.2.10 and earlier allow remote moderators and administrators to execute arbitrary SQL commands via (1) the mergepost parameter in a do_mergeposts action, (2) rid parameter in an allreports action, or (3) threads parameter in a do_multimovethreads action to (a) moderation.php; or (4) gid parameter to (b) admin/usergroups.php.
|
[
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-33889
|
OpenThread wpantund through 2021-07-02 has a stack-based Buffer Overflow because of an inconsistency in the integer data type for metric_len.
|
[
"cpe:2.3:a:openthread:wpantund:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 | null |
|
CVE-2016-1641
|
Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
CVE-2023-50774
|
A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system.
|
[
"cpe:2.3:a:jenkins:html_resource:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:html_resource:1.02:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-92qw-2643-79jm
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2023-48247
|
The vulnerability allows an unauthenticated remote attacker to read arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.
|
[
"cpe:2.3:o:bosch:nexo-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v-b_\\(0608842012\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v_\\(0608842011\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v-b_\\(0608842006\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v_\\(0608842001\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v-b_\\(0608842007\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v_\\(0608842002\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v-b_\\(0608842008\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v_\\(0608842003\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v-b_\\(0608842014\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v_\\(0608842013\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v-b_\\(0608842010\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v_\\(0608842005\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v-b_\\(0608842016\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v_\\(0608842015\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2272\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2301\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2514\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2515\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2666\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2673\\):-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-24890
|
Command injection in ioprobe of gala-gopher
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler gala-gopher on Linux allows Command Injection. This vulnerability is associated with program files https://gitee.Com/openeuler/gala-gopher/blob/master/src/probes/extends/ebpf.Probe/src/ioprobe/ioprobe.C.
This issue affects gala-gopher: through 1.0.2.
|
[
"cpe:2.3:a:openeuler:gala-gopher:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2024-39589
|
Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Read_Reply` function
|
[
"cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:openplcproject:openplc_v3_firmware:2024-05-28:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2017-13779
|
GSTN_offline_tool in India Goods and Services Tax Network (GSTN) Offline Utility tool before 1.2 executes winstart-server.vbs from the "C:\GST Offline Tool" directory, which has insecure permissions. This allows local users to gain privileges by replacing winstart-server.vbs with arbitrary VBScript code. For example, a local user could create VBScript code for a TCP reverse shell, and use that later for Remote Command Execution.
|
[
"cpe:2.3:a:gstn:india_goods_and_services_tax_network_offline_utility_tool:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-r7ph-g2h5-66hm
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
GHSA-48rg-9m95-738v
|
Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22829.
|
[] | null | null | 7.8 | null | null |
|
CVE-2000-0032
|
Solaris dmi_cmd allows local users to crash the dmispd daemon by adding a malformed file to the /var/dmi/db database.
|
[
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-qjg2-xpg2-3hrf
|
FS Gigs Script 1.0 has SQL Injection via the browse-category.php cat parameter, browse-scategory.php sc parameter, or service-provider.php ser parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vw35-vgjr-5jhv
|
There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.
|
[] | null | 7.8 | null | null | null |
|
GHSA-xhrx-q868-cx2w
|
The Bilingual Magic Ball (aka com.wBilingualMagicBall) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-6wwg-93x9-c3fr
|
The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().
|
[] | null | null | 9.8 | null | null |
|
GHSA-pf8c-w99c-vg7w
|
The Head Unit HU_NBT (aka Infotainment) component on BMW i Series, BMW X Series, BMW 3 Series, BMW 5 Series, and BMW 7 Series vehicles produced in 2012 through 2018 allows a local attack when a USB device is plugged in.
|
[] | null | null | 7.8 | null | null |
|
GHSA-mpxp-95jp-3f78
|
Cross-site scripting (XSS) vulnerability in search.asp in NetDirect ShopEngine allows remote attackers to inject arbitrary web script or HTML via the EXPS parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2013-4275
|
Cross-site scripting (XSS) vulnerability in the zen_breadcrumb function in template.php in the Zen theme 6.x-1.x, 7.x-3.x before 7.x-3.2, and 7.x-5.x before 7.x-5.4 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via the breadcrumb separator field.
|
[
"cpe:2.3:a:zen_project:zen:*:*:*:*:*:drupal:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-2pq5-qhcm-7pr3
|
IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194710.
|
[] | null | null | null | null | null |
|
GHSA-7hx2-pgg7-f6rg
|
A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
GHSA-hcw6-g9w4-84jx
|
Cross-site scripting (XSS) vulnerability in services/get_article.php in KrisonAV CMS before 3.0.2 allows remote attackers to inject arbitrary web script or HTML via the content parameter.
|
[] | null | null | null | null | null |
|
ICSA-24-268-01
|
OPW Fuel Management Systems SiteSentinel
|
The affected product could allow an attacker to bypass authentication to the server and obtain full admin privileges.
|
[] | null | 9.8 | null | null | null |
GHSA-h9j2-347v-3v58
|
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
CVE-2019-18275
|
OSIsoft PI Vision, All versions of PI Vision prior to 2019. The affected product is vulnerable to an improper access control, which may return unauthorized tag data when viewing analysis data reference attributes.
|
[
"cpe:2.3:a:osisoft:pi_vision:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2024-51773
|
Authenticated Stored Cross-Site Scripting (XSS) in HPE Aruba Networking ClearPass Policy Manager Web-based Management Interface
|
A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote Attacker to conduct a stored cross-site scripting (XSS) attack. Successful exploitation could enable a threat actor to perform any actions the user is authorized to do, including accessing the user's data and altering information within the user's permissions. This could lead to data modification, deletion, or theft, including unauthorized access to files, file deletion, or the theft of session cookies, which an attacker could use to hijack a user's session.
|
[] | null | 4.8 | null | null | null |
CVE-2023-32060
|
DHIS2 Core Improper Access Control with Category Option Combination sharing in /api/trackedEntityInstance and /api/events
|
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.35 branch and prior to versions 2.36.13, 2.37.8, 2.38.2, and 2.39.0, when the Category Option Combination Sharing settings are configured to control access to specific tracker program events or program stages, the `/trackedEntityInstances` and `/events` API endpoints may include all events regardless of the sharing settings applied to the category option combinations. When this specific configuration is present, users may have access to events which they should not be able to see based on the sharing settings of the category options. The events will not appear in the user interface for web-based Tracker Capture or Capture applications, but if the Android Capture App is used they will be displayed to the user. Versions 2.36.13, 2.37.8, 2.38.2, and 2.39.0 contain a fix for this issue. No workaround is known.
|
[
"cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-3781
|
there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-fg23-6j5x-j67j
|
An uncontrolled resource consumption vulnerability exists in the `upload-link` endpoint of mintplex-labs/anything-llm. This vulnerability allows attackers to cause a denial of service (DOS) by shutting down the server through sending invalid upload requests. Specifically, the server can be made to shut down by sending an empty body with a 'Content-Length: 0' header or by sending a body with arbitrary content, such as 'asdasdasd', with a 'Content-Length: 9' header. The vulnerability is reproducible by users with at least a 'Manager' role, sending a crafted request to any workspace. This issue indicates that a previous fix was not effective in mitigating the vulnerability.
|
[] | null | null | 6.5 | null | null |
|
GHSA-gcv4-6hmh-xhwc
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: send: fix buffer overflow detection when copying path to cache entryStarting with commit c0247d289e73 ("btrfs: send: annotate struct
name_cache_entry with __counted_by()") we annotated the variable length
array "name" from the name_cache_entry structure with __counted_by() to
improve overflow detection. However that alone was not correct, because
the length of that array does not match the "name_len" field - it matches
that plus 1 to include the NUL string terminator, so that makes a
fortified kernel think there's an overflow and report a splat like this:strcpy: detected buffer overflow: 20 byte write of buffer size 19
WARNING: CPU: 3 PID: 3310 at __fortify_report+0x45/0x50
CPU: 3 UID: 0 PID: 3310 Comm: btrfs Not tainted 6.11.0-prnet #1
Hardware name: CompuLab Ltd. sbc-ihsw/Intense-PC2 (IPC2), BIOS IPC2_3.330.7 X64 03/15/2018
RIP: 0010:__fortify_report+0x45/0x50
Code: 48 8b 34 (...)
RSP: 0018:ffff97ebc0d6f650 EFLAGS: 00010246
RAX: 7749924ef60fa600 RBX: ffff8bf5446a521a RCX: 0000000000000027
RDX: 00000000ffffdfff RSI: ffff97ebc0d6f548 RDI: ffff8bf84e7a1cc8
RBP: ffff8bf548574080 R08: ffffffffa8c40e10 R09: 0000000000005ffd
R10: 0000000000000004 R11: ffffffffa8c70e10 R12: ffff8bf551eef400
R13: 0000000000000000 R14: 0000000000000013 R15: 00000000000003a8
FS: 00007fae144de8c0(0000) GS:ffff8bf84e780000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fae14691690 CR3: 00000001027a2003 CR4: 00000000001706f0
Call Trace:
<TASK>
? __warn+0x12a/0x1d0
? __fortify_report+0x45/0x50
? report_bug+0x154/0x1c0
? handle_bug+0x42/0x70
? exc_invalid_op+0x1a/0x50
? asm_exc_invalid_op+0x1a/0x20
? __fortify_report+0x45/0x50
__fortify_panic+0x9/0x10
__get_cur_name_and_parent+0x3bc/0x3c0
get_cur_path+0x207/0x3b0
send_extent_data+0x709/0x10d0
? find_parent_nodes+0x22df/0x25d0
? mas_nomem+0x13/0x90
? mtree_insert_range+0xa5/0x110
? btrfs_lru_cache_store+0x5f/0x1e0
? iterate_extent_inodes+0x52d/0x5a0
process_extent+0xa96/0x11a0
? __pfx_lookup_backref_cache+0x10/0x10
? __pfx_store_backref_cache+0x10/0x10
? __pfx_iterate_backrefs+0x10/0x10
? __pfx_check_extent_item+0x10/0x10
changed_cb+0x6fa/0x930
? tree_advance+0x362/0x390
? memcmp_extent_buffer+0xd7/0x160
send_subvol+0xf0a/0x1520
btrfs_ioctl_send+0x106b/0x11d0
? __pfx___clone_root_cmp_sort+0x10/0x10
_btrfs_ioctl_send+0x1ac/0x240
btrfs_ioctl+0x75b/0x850
__se_sys_ioctl+0xca/0x150
do_syscall_64+0x85/0x160
? __count_memcg_events+0x69/0x100
? handle_mm_fault+0x1327/0x15c0
? __se_sys_rt_sigprocmask+0xf1/0x180
? syscall_exit_to_user_mode+0x75/0xa0
? do_syscall_64+0x91/0x160
? do_user_addr_fault+0x21d/0x630
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fae145eeb4f
Code: 00 48 89 (...)
RSP: 002b:00007ffdf1cb09b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fae145eeb4f
RDX: 00007ffdf1cb0ad0 RSI: 0000000040489426 RDI: 0000000000000004
RBP: 00000000000078fe R08: 00007fae144006c0 R09: 00007ffdf1cb0927
R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffdf1cb1ce8
R13: 0000000000000003 R14: 000055c499fab2e0 R15: 0000000000000004
</TASK>Fix this by not storing the NUL string terminator since we don't actually
need it for name cache entries, this way "name_len" corresponds to the
actual size of the "name" array. This requires marking the "name" array
field with __nonstring and using memcpy() instead of strcpy() as
recommended by the guidelines at:https://github.com/KSPP/linux/issues/90
|
[] | null | 7.8 | null | null | null |
|
GHSA-fqr9-v44c-j829
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hamed Naderfar Compute Links allows PHP Remote File Inclusion.This issue affects Compute Links: from n/a through 1.2.1.
|
[] | null | 9.6 | null | null | null |
|
CVE-2021-27320
|
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter.
|
[
"cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-grgm-r673-rg94
|
In sysui, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed
|
[] | null | 5.5 | null | null | null |
|
CVE-2016-9252
|
The Traffic Management Microkernel (TMM) in F5 BIG-IP before 11.5.4 HF3, 11.6.x before 11.6.1 HF2 and 12.x before 12.1.2 does not properly handle minimum path MTU options for IPv6, which allows remote attackers to cause a denial-of-service (DoS) through unspecified vectors.
|
[
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2010-3682
|
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
|
[
"cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2024-10050
|
Elementor Header & Footer Builder <= 1.6.43 - Authenticated (Contributor+) Information Disclosure via Shortcode
|
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 1.6.43 via the hfe_template shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to view the contents of Draft, Private and Password-protected posts they do not own.
|
[] | null | 4.3 | null | null | null |
RHSA-2023:0049
|
Red Hat Security Advisory: grub2 security update
|
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null | null |
CVE-2024-30098
|
Windows Cryptographic Services Security Feature Bypass Vulnerability
|
Windows Cryptographic Services Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2025-22891
|
BIG-IP PEM Vulnerability
|
When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | 8.7 | 7.5 | null | null | null |
GHSA-rrrh-29xf-2p7r
|
Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created.
|
[] | null | null | null | null | null |
|
GHSA-q2cv-wcfr-f9xr
|
Cross-site scripting (XSS) vulnerability in the GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.x and 11.x before 11.0 FP4 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[] | null | null | null | null | null |
|
GHSA-2ccc-6qjv-38cv
|
An issue in twonav v.2.1.18-20241105 allows a remote attacker to obtain sensitive information via the link identification function.
|
[] | null | 6.5 | null | null | null |
|
GHSA-85w3-6f4c-mf9j
|
rtl_433 21.12 was discovered to contain a stack overflow in the function acurite_00275rm_decode at /devices/acurite.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-5399
|
CredHub does not properly enable TLS for MySQL database connections
|
Cloud Foundry CredHub, versions prior to 2.5.10, connects to a MySQL database without TLS even when configured to use TLS. A malicious user with access to the network between CredHub and its MySQL database may eavesdrop on database connections and thereby gain unauthorized access to CredHub and other components.
|
[
"cpe:2.3:a:cloudfoundry:credhub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:cloud_foundry_cf-deployment:*:*:*:*:*:*:*:*"
] | null | null | 7.6 | null | null |
GHSA-4gvv-82j8-4qwx
|
A SQL Injection vulnerability exists in Ivanti Avalance before 6.3.3 allows an attacker with access to the Inforail Service to perform privilege escalation.
|
[] | null | null | null | null | null |
|
GHSA-c579-hhw5-cr3p
|
Enhavo Cross-site Scripting vulnerability
|
A cross-site scripting (XSS) vulnerability in the Header module of Enhavo CMS v0.13.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Undertitle text field.
|
[] | null | 6.1 | null | null | null |
CVE-2024-6367
|
LabVantage LIMS POST Request cross site scripting
|
A vulnerability was found in LabVantage LIMS 2017. It has been declared as problematic. This vulnerability affects unknown code of the file /labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp of the component POST Request Handler. The manipulation of the argument sdcid/keyid1/keyid2/keyid3 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269800. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:labvantage:lims:2017:*:*:*:*:*:*:*",
"cpe:2.3:a:labvantage:laboratory_information_management_system:2017:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
GHSA-w6hw-57jq-h7f5
|
CSRF vulnerability in Amazon EC2 Plugin
|
Amazon EC2 Plugin 1.50.1 and earlier does not require POST requests in several HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities. This allows an attacker to provision instances with an attacker-specified template ID.Amazon EC2 Plugin 1.50.2 now requires POST requests for the affected HTTP endpoints.
|
[] | null | null | 3.1 | null | null |
GHSA-2rfr-r5fg-2857
|
Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.
|
[] | null | 8.2 | null | null | null |
|
GHSA-47vw-3hx2-6877
|
Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
RHBA-2015:2161
|
Red Hat Bug Fix Advisory: libcap-ng bug fix and enhancement update
|
policycoreutils: local privilege escalation via seunshare
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
RHEA-2018:0705
|
Red Hat Enhancement Advisory: tcpdump bug fix and enhancement update
|
tcpdump: Heap buffer overflow in the EXTRACT_16BITS function tcpdump: heap-based buffer over-read in the lldp_print tcpdump: heap-based buffer over-read in the pimv1_print tcpdump: buffer overflow in the sliplink_print function tcpdump: Segmentation Violation in the compressed_sl_print tcpdump: Buffer over-read in smbutil.c:name_len() in SMB/CIFS parser tcpdump: Buffer over-read in addrtoname.c:lookup_bytestring() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-isakmp.c:isakmp_rfc3948_print() in ISAKMP parser tcpdump: Buffer over-read in print-isoclns.c:isoclns_print() in ISO CLNS parser tcpdump: Buffer over-read in print-nfs.c:interp_reply() in NFS parser tcpdump: Buffer over-read in print-decnet.c:decnet_print() in DECnet parser tcpdump: Buffer over-read in util-print.c:tok2strbuf() tcpdump: Buffer over-read in print-eigrp.c:eigrp_print() in EIGRP parser tcpdump: Buffer over-read in print-zephyr.c, several functions in Zephyr parser tcpdump: Buffer over-read in print-ip6.c:ip6_print() in IPv6 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-telnet.c:telnet_parse() in telnet parser tcpdump: Infinite loop due to a bug in print-resp.c:resp_get_length() in RESP parser tcpdump: Infinite loop due to bugs in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-ripng.c:ripng_print() in RIPng parser tcpdump: Buffer over-read in print-juniper.c, several functions in Juniper protocols parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Infinite loop due to a bug in print-domain.c:ns_print() in DNS parser tcpdump: Buffer over-read in print-pim.c:pimv2_print() in PIMv2 parser tcpdump: Infinite loop due to a bug in print-lldp.c:lldp_private_8021_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_extd_ip_reach() in IS-IS parser tcpdump: Buffer over-read in print-isoclns.c:isis_print() in IS-IS parser tcpdump: Buffer over-read in print-802_15_4.c:ieee802_15_4_if_print() in IEEE 802.15.4 parser tcpdump: Buffer over-read in print-nfs.c:nfs_printfh() in NFS parser tcpdump: Buffer over-read in print-aodv.c:aodv_extension() in AODV parser tcpdump: Buffer over-read in print-lmp.c:lmp_print() in LMP parser tcpdump: Buffer over-read in print-juniper.c:juniper_parse_header() in Juniper protocols parser tcpdump: Buffer over-read in print-nfs.c:xid_map_enter() in NFS parser tcpdump: Buffer over-read in print-l2tp.c, several functions in L2TP parser tcpdump: Buffer over-read in print-pktap.c:pktap_if_print() in Apple PKTAP parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-mobility.c:mobility_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-beep.c:l_strnstart() in BEEP parser tcpdump: Buffer overflow in util-print.c:bittok2str_internal() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-arp.c, several functions in ARP parser tcpdump: Buffer over-read in print-wb.c:wb_prep(), several functions in White Board protocol parser tcpdump: Buffer over-read in print-eap.c:eap_print() in EAP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-dhcp6.c:dhcp6opt_print() in DHCPv6 parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_print() in ICMPv6 parser tcpdump: Buffer over-read in print-ip.c:ip_printroute() in IP parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-isoclns.c, several functions in ISO IS-IS parser tcpdump: Buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print() in LLDP parser tcpdump: Buffer over-read in print-bootp.c:bootp_print() in BOOTP parser tcpdump: Buffer over-read in print-ppp.c:print_ccp_config_options() in PPP parser tcpdump: Buffer over-read in print-pim.c, several functions in PIM parser tcpdump: Buffer over-read in print-frag6.c:frag6_print() in IPv6 fragmentation header parser tcpdump: Buffer over-read in print-radius.c:print_attr_string() in RADIUS parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_id() in ISO IS-IS parser tcpdump: Buffer over-read in print-ospf6.c:ospf6_decode_v3() in OSPFv3 parser tcpdump: Buffer over-read in print-ip.c:ip_printts() in IP parser tcpdump: Buffer over-read in print-ppp.c:handle_mlppp() in PPP parser tcpdump: Buffer over-read in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-mptcp.c, several functions in MPTCP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_nodeinfo_print() in ICMPv6 parser tcpdump: Buffer over-read in print-hncp.c:dhcpv6_print() in HNCP parser tcpdump: Buffer over-read in print-bgp.c:decode_multicast_vpn() in BGP parser tcpdump: Buffer over-read in print-hncp.c:dhcpv4_print() in HNCP parser tcpdump: Buffer over-read in print-vqp.c:vqp_print() in VQP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-rx.c:ubik_print() in Rx protocol parser tcpdump: Buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print() in RPKI-Router parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-cfm.c:cfm_print() in CFM parser tcpdump: Buffer over-read in print-bgp.c:decode_rt_routing_info() in BGP parser tcpdump: Buffer over-read in print-lldp.c:lldp_private_8023_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv() in ISO IS-IS parser tcpdump: Buffer over-read in print-chdlc.c:chdlc_print() in Cisco HDLC parser tcpdump: Buffer over-read in print-olsr.c:olsr_print() in OLSR parser tcpdump: Buffer over-read in print-isakmp.c:ikev1_id_print() in IKEv1 parser tcpdump: Buffer over-read in print-isakmp.c, several functions in IKEv2 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null | null |
CVE-2023-23995
|
WordPress TinyMCE Custom Styles Plugin <= 1.1.2 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tim Reeves & David Stöckl TinyMCE Custom Styles plugin <= 1.1.2 versions.
|
[
"cpe:2.3:a:tinymce_custom_styles_project:tinymce_custom_styles:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-f5v5-ccqc-6w36
|
async-nats vulnerable to TLS certificate common name validation bypass
|
The NATS official Rust clients are vulnerable to MitM when using TLS.The common name of the server's TLS certificate is validated against the `host`name provided by the server's plaintext `INFO` message during the initial connection setup phase. A MitM proxy can tamper with the `host` field's value by substituting it with the common name of a valid certificate it controls, fooling the client into accepting it.Reproduction stepsThe NATS Rust client tries to establish a new connectionThe connection is intercepted by a MitM proxyThe proxy makes a separate connection to the NATS serverThe NATS server replies with an `INFO` messageThe proxy reads the `INFO`, alters the `host` JSON field and passes the tampered `INFO` back to the clientThe proxy upgrades the client connection to TLS, presenting a certificate issued by a certificate authority present in the client's keychain. In the previous step the `host` was set to the common name of said certificate`rustls` accepts the certificate, having verified that the common name matches the attacker-controlled value it was givenThe client has been fooled by the MitM proxy into accepting the attacker-controlled certificate
|
[] | null | null | null | null | null |
GHSA-33w9-gx86-5qvx
|
The Sandbox plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the export_download action in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download an entire copy of a sandbox environment which can contain sensitive information like the wp-config.php file.
|
[] | null | 6.5 | null | null | null |
|
GHSA-f3rg-mx46-665p
|
Heap-based buffer overflow in the IBM AFP Viewer Plug-in 2.0.7.1 and 3.2.1.1 allows remote attackers to execute arbitrary code via a long SRC property value. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-c549-c54c-qvxq
|
Active Directory Federation Services Elevation of Privilege Vulnerability.
|
[] | null | 7.5 | null | null | null |
|
GHSA-f87r-2g9r-6576
|
A vulnerability in the web-based management interface of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker needs administrator credentials. This vulnerability affects Cisco DNA Center Software releases earlier than 1.3.0.6 and 1.3.1.4.
|
[] | null | 4.8 | null | null | null |
|
CVE-2023-50981
|
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
|
[
"cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2011-2013
|
Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2018-15734
|
An issue was discovered in STOPzilla AntiMalware 6.5.2.59. The driver file szkg64.sys contains an Arbitrary Write vulnerability due to not validating the output buffer address value from IOCtl 0x8000206B.
|
[
"cpe:2.3:a:stopzilla:antimalware:6.5.2.59:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
CVE-2020-1398
|
An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly handle Ease of Access dialog.An attacker who successfully exploited the vulnerability could execute commands with elevated permissions.The security update addresses the vulnerability by ensuring that the Ease of Access dialog is handled properly., aka 'Windows Lockscreen Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 | null |
|
GHSA-vm39-gch2-wh7r
|
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "JavaScriptCore" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that triggers prototype mishandling.
|
[] | null | null | 6.1 | null | null |
|
GHSA-h97q-54jx-527j
|
Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-7215
|
The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow.
|
[
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2010-4351
|
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.
|
[
"cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.