id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2010-0392
|
Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase 2."
|
[
"cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:*",
"cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.65.003:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-p74g-3426-3685
|
Cisco IOS before 12.2(50)SY1 allows remote authenticated users to cause a denial of service (memory consumption) via a sequence of VTY management sessions (aka exec sessions), aka Bug ID CSCtn43662.
|
[] | null | null | null | null | null |
|
GHSA-9fx5-x523-x375
|
In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process.
|
[] | null | 9.8 | null | null | null |
|
GHSA-62x2-7ppm-gf38
|
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
|
[] | null | 7 | null | null | null |
|
CVE-2013-4761
|
Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
|
[
"cpe:2.3:a:puppet:puppet:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:3.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-64r8-pw62-6prc
|
IBM Aspera Shares 1.10.0 PL2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 260574.
|
[] | null | 6.3 | null | null | null |
|
GHSA-2g24-99jw-85x7
|
Buffer overflow in KarjaSoft Sami HTTP Server 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.
|
[] | null | null | null | null | null |
|
CVE-2024-0988
|
Sichuan Yougou Technology KuERP common.php checklogin improper authentication
|
A vulnerability classified as critical was found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this vulnerability is the function checklogin of the file /application/index/common.php. The manipulation of the argument App_User_id/App_user_Token leads to improper authentication. The exploit has been disclosed to the public and may be used. The identifier VDB-252253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:kuerp_project:kuerp:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 5.8 | null |
CVE-2024-7750
|
SourceCodester Clinics Patient Management System medicines.php sql injection
|
A vulnerability has been found in SourceCodester Clinics Patient Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /medicines.php. The manipulation of the argument medicine_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:clinics_patient_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2022-31206
|
The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.
|
[
"cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:nj501-5300-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:nj501-5300-1:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2024:11298
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 6.5 | null | null | null |
GHSA-9gg2-vcvv-996c
|
Insufficient protection of secrets in Citrix XenMobile Server 10.12 before RP3, Citrix XenMobile Server 10.11 before RP6, Citrix XenMobile Server 10.10 RP6 and Citrix XenMobile Server before 10.9 RP5 discloses credentials of a service account.
|
[] | null | null | null | null | null |
|
CVE-2022-41680
|
SQL Injection in Forma LMS
|
Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'search[value] parameter in the appLms/ajax.server.php?r=mycertificate/getMyCertificates' function in order to dump the entire database.
|
[
"cpe:2.3:a:formalms:formalms:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
GHSA-8c8m-84mj-r2xv
|
FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114, and OpenFyde R114 were discovered to be configured with the root password saved as a wildcard. This allows attackers to gain root access without a password.
|
[] | null | 9.8 | null | null | null |
|
GHSA-7pr8-p7jp-8qv2
|
Unspecified vulnerability in IBM Tivoli NetView 1.4, 5.1 through 5.4, and 6.1 on z/OS allows local users to gain privileges by leveraging access to the normal Unix System Services (USS) security level.
|
[] | null | null | null | null | null |
|
CVE-2019-12427
|
Zimbra Collaboration before 8.8.15 Patch 1 is vulnerable to a non-persistent XSS via the Admin Console.
|
[
"cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2024-10128
|
Topdata Inner Rep Plus WebServer td.js.gz risky encryption
|
A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:topdata:inner_rep_plus_webserver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:topdata:inner_rep_plus:2.01:*:*:*:*:*:*:*"
] | 5.1 | 2.7 | 2.7 | 3.3 | null |
GHSA-jjv9-765p-62g3
|
SQL injection vulnerability in kategori.asp in Pcshey Portal allows remote attackers to execute arbitrary SQL commands via the kid parameter.
|
[] | null | null | null | null | null |
|
GHSA-jfjp-pcc3-pr3f
|
A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-3g8j-6hfm-wj7g
|
Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136.
|
[] | null | 8.2 | null | null | null |
|
CVE-2023-32033
|
Microsoft Failover Cluster Remote Code Execution Vulnerability
|
Microsoft Failover Cluster Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
RHSA-2002:170
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null | null |
CVE-2018-15586
|
Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
|
[
"cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2021-4446
|
Essential Addons for Elementor <= 4.6.4 - Missing Authorization
|
The Essential Addons for Elementor plugin for WordPress is vulnerable to authorization bypass in versions up to and including 4.6.4 due to missing capability checks and nonce disclosure. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to perform many unauthorized actions such as changing settings and installing arbitrary plugins.
|
[
"cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*"
] | null | 6.3 | null | null | null |
CVE-2024-22015
|
Improper input validation for some Intel(R) DLB driver software before version 8.5.0 may allow an authenticated user to potentially denial of service via local access.
|
[
"cpe:2.3:a:intel:dynamic_load_balancer:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2020-6294
|
Xvfb of SAP Business Objects Business Intelligence Platform, versions - 4.2, 4.3, platform on Unix does not perform any authentication checks for functionalities that require user identity.
|
[
"cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] | null | null | 8.5 | null | null |
|
GHSA-qv8x-gg84-8259
|
Nextcloud Server before 9.0.58 and 10.0.5 and 11.0.3 are shipping a vulnerable JavaScript library for sanitizing untrusted user-input which suffered from a XSS vulnerability caused by a behaviour change in Safari 10.1 and 10.2. Note that Nextcloud employs a strict Content-Security-Policy preventing exploitation of this XSS issue on modern web browsers.
|
[] | null | null | 5.4 | null | null |
|
CVE-2020-3413
|
Cisco Webex Meetings Scheduled Meeting Template Deletion Vulnerability
|
A vulnerability in the scheduled meeting template feature of Cisco Webex Meetings could allow an authenticated, remote attacker to delete a scheduled meeting template that belongs to another user in their organization. The vulnerability is due to insufficient authorization enforcement for requests to delete scheduled meeting templates. An attacker could exploit this vulnerability by sending a crafted request to the Webex Meetings interface to delete a scheduled meeting template. A successful exploit could allow the attacker to delete a scheduled meeting template that belongs to a user other than themselves.
|
[
"cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-j6qw-mm8g-6fjw
|
Intrexx Portal Server 12.x <= 12.0.2 and 11.x <= 11.9.2 allows XSS in multiple Velocity scripts.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-4061
|
JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload
|
The JobBoardWP WordPress plugin before 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.
|
[
"cpe:2.3:a:ultimatemember:jobboardwp:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
CVE-2022-2329
|
A CWE-190: Integer Overflow or Wraparound vulnerability exists that could cause heap-based buffer overflow, leading to denial of service and potentially remote code execution when an attacker sends multiple specially crafted messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22073)
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2020:1765
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: stack-buffer-overflow in libcups's asn1_get_type function cups: stack-buffer-overflow in libcups's asn1_get_packed function
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.5 | null | null |
CVE-2013-1468
|
Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors.
|
[
"cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:piwigo:piwigo:2.4.5:*:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
GHSA-hqgf-xpw9-m8hc
|
Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email. This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively.
|
[] | null | 5.8 | null | null | null |
|
CVE-2023-1713
|
Bitrix24 Remote Command Execution (RCE) via Insecure Temporary File Creation
|
Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted ".htaccess" file.
|
[
"cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2024-42352
|
Server-Side Request Forgery (SSRF) in nuxt-icon
|
Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. `nuxt/icon` provides an API to allow client side icon lookup. This endpoint is at `/api/_nuxt_icon/[name]`. The proxied request path is improperly parsed, allowing an attacker to change the scheme and host of the request. This leads to SSRF, and could potentially lead to sensitive data exposure. The `new URL` constructor is used to parse the final path. This constructor can be passed a relative scheme or path in order to change the host the request is sent to. This constructor is also very tolerant of poorly formatted URLs. As a result we can pass a path prefixed with the string `http:`. This has the effect of changing the scheme to HTTP. We can then subsequently pass a new host, for example `http:127.0.0.1:8080`. This would allow us to send requests to a local server. This issue has been addressed in release version 1.4.5 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:nuxt:icon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
GHSA-763p-p3fq-9rj5
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) node request management, (2) live management, and (3) user administration components in the console in Puppet Enterprise (PE) before 2.7.1 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-38454
|
In vowifi service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2023-5826
|
Netentsec NS-ASG Application Security Gateway list_onlineuser.php sql injection
|
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/list_onlineuser.php. The manipulation of the argument SessionId leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243716. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
|
[
"cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 | null |
CVE-2024-20652
|
Windows HTML Platforms Security Feature Bypass Vulnerability
|
Windows HTML Platforms Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2008-4323
|
Windows Explorer in Microsoft Windows XP SP3 allows user-assisted attackers to cause a denial of service (application crash) via a crafted .ZIP file.
|
[
"cpe:2.3:o:microsoft:windows_xp:sp3:unknown:english:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-m48x-q5f2-q428
|
Moddable SDK v11.5.0 was discovered to contain a heap-buffer-overflow via the component __asan_memcpy.
|
[] | null | null | null | null | null |
|
RHSA-2018:2172
|
Red Hat Security Advisory: kernel security update
|
kernel: Divide-by-zero in __tcp_select_window hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null | null |
GHSA-fj87-6gv7-h87w
|
A maliciously crafted project file may cause a buffer overflow, which may allow the attacker to execute arbitrary code that affects Fuji Electric V-Server Lite 4.0.3.0 and prior.
|
[] | null | null | 7.8 | null | null |
|
GHSA-f47h-hr72-5959
|
Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16.
|
[] | null | 4.3 | null | null | null |
|
GHSA-3wg3-6wwv-v265
|
A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function.
|
[] | 6.8 | null | null | null | null |
|
CVE-2017-14549
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .djvu file, related to a "Heap Corruption starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
|
[
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
GHSA-v8xh-q39p-9322
|
Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
[] | null | null | 6.1 | null | null |
|
CVE-2023-27372
|
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
|
[
"cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:4.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:4.2.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:4.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2022-22028
|
Windows Network File System Information Disclosure Vulnerability
|
Windows Network File System Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-59wr-qwjc-mfwf
|
Out-of-bounds read in decoding malformed frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption.
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-11240
|
An issue was discovered on SoftCase T-Router build 20112017 devices. There are no restrictions on the 'exec command' feature of the T-Router protocol. If the command syntax is correct, there is code execution both on the other modem and on the main servers. This is fixed in production builds as of Spring 2018.
|
[
"cpe:2.3:o:softcase:t-router_firmware:20112017:*:*:*:*:*:*:*",
"cpe:2.3:h:softcase:t-router:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2022-43513
|
A vulnerability has been identified in Automation License Manager V5 (All versions), Automation License Manager V6 (All versions < V6.0 SP9 Upd4), TeleControl Server Basic V3 (All versions < V3.1.2). The affected components allow to rename license files with user chosen input without authentication.
This could allow an unauthenticated remote attacker to rename and move files as SYSTEM user.
|
[
"cpe:2.3:a:siemens:automation_license_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.3:sp3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:5.3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:automation_license_manager:6.0.9:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
CVE-2024-43742
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-ghq8-mj24-5v6f
|
In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' command.
|
[] | null | null | 9.1 | null | null |
|
CVE-2014-7464
|
The Magic Stamp (aka vn.avagame.apotatem) application 2.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:magicstamp:magic_stamp:2.8:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2020-0769
|
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows CSC Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0771.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:itanium:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2022-35099
|
SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.
|
[
"cpe:2.3:a:swftools:swftools:2021-12-16:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-f9w4-q8jc-qc4v
|
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
|
[] | null | null | null | null | null |
|
GHSA-mxrw-2vpr-fpwr
|
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
|
[] | null | 9.1 | null | null | null |
|
RHSA-2023:1792
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null | null |
GHSA-5wxq-6p7v-m87w
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd: Guard against bad data for ATIF ACPI methodIf a BIOS provides bad data in response to an ATIF method call
this causes a NULL pointer dereference in the caller.It has been encountered on at least one system, so guard for it.(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)
|
[] | null | 5.5 | null | null | null |
|
RHSA-2022:8057
|
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
|
sanitize-url: XSS due to improper sanitization in sanitizeUrl function golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions grafana: Forward OAuth Identity Token can allow users to access some data sources prometheus/client_golang: Denial of service using InstrumentHandlerCounter grafana: XSS vulnerability in data source handling grafana: CSRF vulnerability can lead to privilege escalation grafana: IDOR vulnerability can lead to information disclosure golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null | null |
CVE-2015-4118
|
SQL injection vulnerability in monitor/show_sys_state.php in ISPConfig before 3.0.5.4p7 allows remote authenticated users with monitor permissions to execute arbitrary SQL commands via the server parameter. NOTE: this can be leveraged by remote attackers using CVE-2015-4119.2.
|
[
"cpe:2.3:a:ispconfig:ispconfig:*:p6:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-frxj-5j27-f8rf
|
Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible
|
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
|
[] | 7 | 5.6 | null | null | null |
CVE-2002-2166
|
Cross-site scripting (XSS) vulnerability in FuseTalk 2.0 and 3.0 allows remote attackers to insert arbitrary HTML and web script.
|
[
"cpe:2.3:a:e-zone_media_inc.:fusetalk:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:e-zone_media_inc.:fusetalk:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-w8wp-rv4w-h5pp
|
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
|
[] | null | 7.2 | null | null | null |
|
CVE-2022-4325
|
Post Status Notifier Lite < 1.10.1 - Reflected XSS
|
The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin.
|
[
"cpe:2.3:a:ifeelweb:post_status_notifier_lite:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-7h3x-gchg-chhg
|
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
|
[] | null | null | null | null | null |
|
GHSA-q37w-9m74-wmpg
|
Multiple cross-site scripting (XSS) vulnerabilities in Michael Salzer Guestbox 0.6, and other versions before 0.8, allow remote attackers to inject arbitrary web script or HTML via (1) HTML tags that follow a "http://" string, which bypasses a regular expression check, and (2) other unspecified attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-qx23-p4v5-5xrm
|
The web interface for IBM Tivoli Micromuse Netcool/NeuSecure 3.0.236 includes the MySQL database username and password in cleartext in body.phtml, which allows remote attackers to gain privileges by reading the source. NOTE: IBM has privately confirmed to CVE that a fix is available for these issues.
|
[] | null | null | null | null | null |
|
CVE-2005-1597
|
Cross-site scripting (XSS) vulnerability in (1) search.php and (2) topics.php for Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlite parameter.
|
[
"cpe:2.3:a:invision_power_services:invision_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_alpha_3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_pdr3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2015-0642
|
Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum36951.
|
[
"cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3sg.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3sg.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3sg.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s_base:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s_base:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7e.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s_base:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s_base:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-32rc-pv7x-94gg
|
Under specific 802.11 network conditions, a partial re-association of the Philips IntelliVue MX40 Version B.06.18 WLAN monitor to the central monitoring station is possible. In this state, the central monitoring station can indicate the MX40 is not connected or associated to the central monitor, and thus should be operating in local monitoring mode (local audio-on, screen-on), but the MX40 WLAN itself can instead still be operating in telemetry mode (local audio-off, screen-off). If a patient experiences an alarm event and clinical staff expects the MX40 to provide local alarming when it is not available from the local device, a delay of treatment can occur. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
|
[] | null | null | 6.5 | null | null |
|
GHSA-q7j5-9j77-g4gq
|
Remote code execution in turn extension for TYPO3
|
The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.
|
[] | null | 8.8 | null | null | null |
GHSA-6chq-45fq-p3pv
|
Cross-site scripting (XSS) vulnerability in the "3 slide gallery" in the Elegant Theme module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via a slide URL.
|
[] | null | null | null | null | null |
|
GHSA-qqh6-xh9f-qf8p
|
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Fleet Management System Suite). The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
|
[] | null | null | 7.1 | null | null |
|
GHSA-x2vf-286w-c7vj
|
This candidate was in a CNA pool that was not assigned to any issues during 2022.
|
[] | null | null | null | null | null |
|
GHSA-c3c4-fvw5-6jg3
|
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-31355
|
Online Ordering System v2.3.2 was discovered to contain a SQL injection vulnerability via /ordering/index.php?q=category&search=.
|
[
"cpe:2.3:a:online_ordering_system_project:online_ordering_system:2.3.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2008-5461
|
Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0, and SP7 allows remote attackers to affect confidentiality, integrity, and availability, related to WLS. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is cross-site scripting.
|
[
"cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-rp77-2mhc-jvcr
|
A vulnerability in the Session Description Protocol (SDP) parser of Cisco Meeting Server could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability affects the following products: Cisco Meeting Server releases prior to Release 2.0.3, Acano Server releases 1.9.x prior to Release 1.9.5, Acano Server releases 1.8.x prior to Release 1.8.17. More Information: CSCva76004. Known Affected Releases: 1.8.x 1.92.0.
|
[] | null | null | 9.8 | null | null |
|
GHSA-fhw3-qv5f-7vrw
|
The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.
|
[] | null | 6.1 | null | null | null |
|
GHSA-w37r-x9rf-6846
|
CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
|
[] | null | null | null | null | null |
|
GHSA-m37g-fw93-h99f
|
An issue was discovered on Samsung mobile devices with O(8.x) software. Access to Gallery in the Secure Folder can occur without authentication. The Samsung ID is SVE-2018-13057 (December 2018).
|
[] | null | null | null | null | null |
|
CVE-2021-47366
|
afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server
|
In the Linux kernel, the following vulnerability has been resolved:
afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server
AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and
Linux's afs client switches between them when talking to a non-YFS server
if the read size, the file position or the sum of the two have the upper 32
bits set of the 64-bit value.
This is a problem, however, since the file position and length fields of
FS.FetchData are *signed* 32-bit values.
Fix this by capturing the capability bits obtained from the fileserver when
it's sent an FS.GetCapabilities RPC, rather than just discarding them, and
then picking out the VICED_CAPABILITY_64BITFILES flag. This can then be
used to decide whether to use FS.FetchData or FS.FetchData64 - and also
FS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to
switch on the parameter values.
This capabilities flag could also be used to limit the maximum size of the
file, but all servers must be checked for that.
Note that the issue does not exist with FS.StoreData - that uses *unsigned*
32-bit values. It's also not a problem with Auristor servers as its
YFS.FetchData64 op uses unsigned 64-bit values.
This can be tested by cloning a git repo through an OpenAFS client to an
OpenAFS server and then doing "git status" on it from a Linux afs
client[1]. Provided the clone has a pack file that's in the 2G-4G range,
the git status will show errors like:
error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
This can be observed in the server's FileLog with something like the
following appearing:
Sun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001
Sun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866
...
Sun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5
Note the file position of 18446744071815340032. This is the requested file
position sign-extended.
|
[] | null | 5.5 | null | null | null |
GHSA-mrc8-h5gc-pvrr
|
A vulnerability was discovered in GitLab versions prior 13.1. Under certain conditions private merge requests could be read via Todos
|
[] | null | null | null | null | null |
|
GHSA-h7g4-65mf-6mxh
|
Cross-site Scripting in Graylog Server
|
Graylog before v2.4.4 has an XSS security issue with unescaped text in notifications, related to toastr and util/UserNotification.js.
|
[] | null | null | 6.1 | null | null |
GHSA-6hh5-gcjx-c6q4
|
A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-46713
|
Sandboxie has Pool Buffer Overflow in SbieDrv.sys API (API_SET_SECURE_PARAM)
|
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. Version 1.15.12 fixes the issue.
|
[] | null | 7.8 | null | null | null |
CVE-2023-1162
|
DrayTek Vigor 2960 Web Management Interface mainfunction.cgi command injection
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is an unknown function of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument password leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222258 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:o:draytek:vigor_2960_firmware:1.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor_2960:-:*:*:*:*:*:*:*"
] | null | 7.2 | 7.2 | 8.3 | null |
CVE-2019-3758
|
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.
|
[
"cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | null | null |
|
CVE-2021-21057
|
Acrobat Reader DC Invalid Memory Read Due To An Uninitialized Pointer
|
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a null pointer dereference vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
GHSA-v4fj-xpm7-phwr
|
Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22037, CVE-2022-30202.
|
[] | null | 7 | null | null | null |
|
CVE-2002-0818
|
wwwoffled in World Wide Web Offline Explorer (WWWOFFLE) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative Content-Length value.
|
[
"cpe:2.3:a:wwwoffle:wwwoffle:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-23507
|
WordPress InstaWP Connect Plugin <= 0.1.0.9 is vulnerable to SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InstaWP Team InstaWP Connect – 1-click WP Staging & Migration.This issue affects InstaWP Connect – 1-click WP Staging & Migration: from n/a through 0.1.0.9.
|
[
"cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*"
] | null | 8.5 | null | null | null |
GHSA-7g2v-jj9q-g3rg
|
Possible Log Injection in Rack::CommonLogger
|
Summary`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.DetailsWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.ImpactAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.MitigationUpdate to the latest version of Rack.
|
[] | 5.7 | null | null | null | null |
RHSA-2024:3926
|
Red Hat Security Advisory: expat security update
|
expat: parsing large tokens can trigger a denial of service expat: XML Entity Expansion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null | null |
CVE-2014-6710
|
The Chifro Kids Coloring Game (aka com.chifro.kids_coloring_game) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:chifro:chifro_kids_coloring_game:1.6:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2019-6140
|
A configuration issue has been discovered in Forcepoint Email Security 8.4.x and 8.5.x: the product is left in a vulnerable state if the hybrid registration process is not completed.
|
[
"cpe:2.3:a:forcepoint:email_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:forcepoint:email_security:8.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.