id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2025-38336
|
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
|
In the Linux kernel, the following vulnerability has been resolved:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
The controller has a hardware bug that can hard hang the system when
doing ATAPI DMAs without any trace of what happened. Depending on the
device attached, it can also prevent the system from booting.
In this case, the system hangs when reading the ATIP from optical media
with cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an
Optiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4,
running at UDMA/33.
The issue can be reproduced by running the same command with a cygwin
build of cdrecord on WinXP, although it requires more attempts to cause
it. The hang in that case is also resolved by forcing PIO. It doesn't
appear that VIA has produced any drivers for that OS, thus no known
workaround exists.
HDDs attached to the controller do not suffer from any DMA issues.
|
[] | null | null | null | null |
GHSA-9j6h-484m-x3f5
|
Mautic uses predictable page indices for unpublished landing pages, their content can be accessed by unauthenticated users under public preview URLs which could expose sensitive data. At the time of publication of the CVE no patch is available
|
[] | null | 5.3 | null | null |
|
CVE-2024-13509
|
WS Form LITE – Drag & Drop Contact Form Builder for WordPress <= 1.10.13 - Unauthenticated Stored Cross-Site Scripting
|
The WS Form LITE – Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the url parameter in all versions up to, and including, 1.10.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability is partially fixed in 1.10.13 and completely fixed in 1.10.14.
|
[] | null | 7.2 | null | null |
CVE-2013-6496
|
Red Hat Conga 0.12.2 allows remote attackers to obtain sensitive information via a crafted request to the (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, or (5) logs Luci extension.
|
[
"cpe:2.3:a:redhat:conga:0.12.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-38633
|
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.
|
[
"cpe:2.3:a:gnome:librsvg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-4j37-xf23-h2px
|
** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193).
|
[] | null | null | 7.8 | null |
|
CVE-2025-48128
|
WordPress Sharespine Woocommerce Connector <= 4.7.55 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Sharespine Sharespine Woocommerce Connector allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Sharespine Woocommerce Connector: from n/a through 4.7.55.
|
[] | null | 4.3 | null | null |
CVE-2023-47829
|
WordPress Quick Call Button Plugin <= 1.2.9 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codez Quick Call Button plugin <= 1.2.9 versions.
|
[
"cpe:2.3:a:codez:quick_call_button:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-h9qj-58xf-q7vq
|
Orion Application Server 1.5.3, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
|
[] | null | null | null | null |
|
CVE-2025-48018
|
Deserialization of Untrusted Data
|
An authenticated user can modify application state data.
|
[] | null | 7.5 | null | null |
CVE-2010-2584
|
The Upload method in the RealPage Module Upload ActiveX control in Realpage.dll 1.0.0.9 in RealPage Module ActiveX Controls does not properly restrict certain property values, which allows remote attackers to read arbitrary files via a filename in the SourceFile property in conjunction with an http URL in the DestURL property.
|
[
"cpe:2.3:a:realpage:module_activex_controls:1.0.0.9:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-13175
|
Read the Docs before 3.5.1 has an Open Redirect if certain user-defined redirects are used. This affects private instances of Read the Docs (in addition to the public readthedocs.org web sites).
|
[
"cpe:2.3:a:readthedocs:read_the_docs:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
GHSA-5q64-3jhr-xr4j
|
The intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, provide different responses to remote requests depending on whether a ZIP pathname is valid, which allows remote attackers to obtain potentially sensitive information about the installation path and product version via a series of requests involving the Msxml2.XMLHTTP object.
|
[] | null | null | null | null |
|
CVE-2006-6800
|
PHP remote file inclusion in eventcal/mod_eventcal.php in the event module 1.0 for Limbo CMS allows remote attackers to execute arbitrary PHP code via a URL in the lm_absolute_path parameter.
|
[
"cpe:2.3:a:limbo_cms:event_module:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-785f-2q79-jj28
|
Unauthorized code execution from specific DLL and is known as DLL Hijacking attack in Kaspersky Password Manager versions before 8.0.6.538.
|
[] | null | null | 7.8 | null |
|
GHSA-vc99-rg67-mm68
|
An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion.
|
[] | null | 7.5 | null | null |
|
ICSA-20-147-01
|
Inductive Automation Ignition (Update B)
|
The affected product lacks proper authentication required to query the server.CVE-2020-12004 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The affected product lacks proper validation of user-supplied data, which can result in deserialization of untrusted data.CVE-2020-10644 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to the handling of serialized data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. CVE-2020-12000 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).. --------- Begin Update B Part 1 of 2 ---------CVE-2020-12000 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Sensitive information can be obtained through the handling of serialized data. The issue results from the lack of proper authentication required to query the server. CVE-2020-14479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).. --------- End Update B Part 1 of 2 ---------CVE-2020-14479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 5.3 | null |
GHSA-6p5x-4w46-32gx
|
The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce.
|
[] | null | 5.3 | null | null |
|
CVE-2019-10974
|
NREL EnergyPlus, Versions 8.6.0 and possibly prior versions, The application fails to prevent an exception handler from being overwritten with arbitrary code.
|
[
"cpe:2.3:a:nrel:energyplus:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 3.6 |
|
GHSA-48v5-hp4g-w2rv
|
Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service.
|
[] | null | null | 6.5 | null |
|
CVE-2020-2273
|
A cross-site request forgery (CSRF) vulnerability in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
|
[
"cpe:2.3:a:jenkins:elastest:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4.3 |
|
CVE-2018-13392
|
Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys.
|
[
"cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2022-28632
|
A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
|
[
"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-0184
|
RRJ Nueva Ecija Engineer Online Portal Add Enginer edit_teacher.php cross site scripting
|
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:nia:rrj_nueva_ecija_engineer_online_portal:1.0:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
GHSA-qvv4-xwrq-f5qv
|
VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations.
|
[] | null | 7.8 | null | null |
|
CVE-2021-1507
|
Cisco SD-WAN vManage API Stored Cross-Site Scripting Vulnerability
|
A vulnerability in an API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the application web-based interface. This vulnerability exists because the API does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending malicious input to the API. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information.
|
[
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
GHSA-3hfp-wjpj-68wv
|
IBM DB2 9.7, 10.1, 10.5, and 11.1 libdb2e.so.1 is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 153316.
|
[] | null | null | 7.8 | null |
|
CVE-2022-42458
|
Authentication bypass using an alternate path or channel vulnerability in bingo!CMS version1.7.4.1 and earlier allows a remote unauthenticated attacker to upload an arbitrary file. As a result, an arbitrary script may be executed and/or a file may be altered.
|
[
"cpe:2.3:a:shift-tech:bingo\\!cms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-76f2-5pmw-p3qg
|
Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Incorrect Access Control. Low privileged users can edit their own ACL rules by sending a request to the "AclList/SaveAclRules" administrative function.
|
[] | null | 8.8 | null | null |
|
GHSA-2c9h-c498-472c
|
The Manager in Eye-Fi 1.1.2 generates predictable snonce values based on the time of day, which allows remote attackers to bypass authentication and upload arbitrary images by guessing the snonce.
|
[] | null | null | null | null |
|
CVE-2023-47631
|
vantage6 Node accepts non-whitelisted algorithms from malicious server
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vantage6:vantage6:4.1.2:rc1:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-gjhx-6mfp-w2f2
|
Format string vulnerability in Apple Safari 2.0.4 (419.3) allows remote user-assisted attackers to cause a denial of service (crash) via format string specifiers in filenames that are not properly handled when calling the (1) NSLog and (2) NSBeginAlertSheet Apple AppKit functions.
|
[] | null | null | null | null |
|
CVE-2015-8628
|
The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.26.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.3 |
|
CVE-2025-2034
|
PHPGurukul Pre-School Enrollment System edit-class.php sql injection
|
A vulnerability has been found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php?cid=1. The manipulation of the argument classname/capacity/classtiming leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-p7p5-vxqp-jhg2
|
IBM Robotic Process Automation with Automation Anywhere 11 could allow an attacker with specialized access to obtain highly sensitive from the credential vault. IBM X-Force ID: 160758.
|
[] | null | 4.9 | null | null |
|
CVE-2019-2050
|
In tearDownClientInterface of WificondControl.java, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9 Android ID: A-121327323
|
[
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2020-15170
|
Missing access control in apollo-adminservice
|
apollo-adminservice before version 1.7.1 does not implement access controls. If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have access control built-in. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet.
|
[
"cpe:2.3:a:ctrip:apollo:*:*:*:*:*:*:*:*"
] | null | 7 | null | null |
GHSA-v977-h4hm-rrff
|
WWBN AVideo Improper Restriction of Excessive Authentication Attempts vulnerability
|
A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to bruteforce users credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
|
[] | null | 7.3 | null | null |
GHSA-44vf-4hm9-43gf
|
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8125, CVE-2018-8262, CVE-2018-8275, CVE-2018-8279, CVE-2018-8301.
|
[] | null | null | 7.5 | null |
|
CVE-2025-6332
|
PHPGurukul Directory Management System manage-directory.php sql injection
|
A vulnerability, which was classified as critical, has been found in PHPGurukul Directory Management System 2.0. Affected by this issue is some unknown functionality of the file /admin/manage-directory.php. The manipulation of the argument del leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2008-3955
|
SQL injection vulnerability in index.php in Masir Camp E-Shop Module 3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the ordercode parameter in a veiworderstatus page.
|
[
"cpe:2.3:a:masir_camp:e-shop_module:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2005-1075
|
Multiple cross-site scripting (XSS) vulnerabilities in RadScripts RadBids Gold 2 allow remote attackers to inject arbitrary web script or HTML via (1) the farea parameter to faq.php or the (2) cat, (3) order, or (4) area parameters to index.php.
|
[
"cpe:2.3:a:radscripts:radbids:2:*:gold:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-43224
|
WordPress YaMaps for WordPress Plugin plugin <= 0.6.27 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yuri Baranov YaMaps for WordPress allows Stored XSS.This issue affects YaMaps for WordPress: from n/a through 0.6.27.
|
[] | null | 6.5 | null | null |
GHSA-j6ch-qp42-33gr
|
In multiple functions of OneTimePermissionUserManager.java, there is a possible one-time permission retention due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null |
|
CVE-2012-3893
|
The FlexVPN implementation in Cisco IOS 15.2 and 15.3 allows remote authenticated users to cause a denial of service (spoke crash) via spoke-to-spoke traffic, aka Bug ID CSCtz02622.
|
[
"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*"
] | null | null | null | 6.3 |
|
GHSA-8fxw-76px-3rxv
|
Memory leak in Tensorflow
|
ImpactIf a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104The allocated memory is from
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L256The issue occurs because the `status` argument during validation failures is not properly checked:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267Since each of the above methods can return an error status, the `status` value must be checked before continuing.PatchesWe have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).
|
[] | 5.3 | 4.3 | null | null |
CVE-2022-47380
|
CODESYS: Multiple products prone to out-of-bounds write
|
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
[
"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-f4rr-5m7v-wxcw
|
Type confusion leading to `CHECK`-failure based denial of service in TensorFlow
|
ImpactThe [macros that TensorFlow uses for writing assertions (e.g., `CHECK_LT`, `CHECK_GT`, etc.)](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/platform/default/logging.h) have an incorrect logic when comparing `size_t` and `int` values. Due to type conversion rules, several of the macros would trigger incorrectly.PatchesWe have patched the issue in GitHub commit [b917181c29b50cb83399ba41f4d938dc369109a1](https://github.com/tensorflow/tensorflow/commit/b917181c29b50cb83399ba41f4d938dc369109a1) (merging GitHub PR [#55730](https://github.com/tensorflow/tensorflow/pull/55730)).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/55530).
|
[] | null | 5.5 | null | null |
CVE-2020-13785
|
D-Link DIR-865L Ax 1.20B01 Beta devices have Inadequate Encryption Strength.
|
[
"cpe:2.3:o:dlink:dir-865l_firmware:1.20b01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-865l:ax:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2021-29116
|
BUG-000142180 Hosted feature services vulnerable to stored XSS
|
A stored Cross Site Scripting (XSS) vulnerability in Esri ArcGIS Server feature services versions 10.8.1 and 10.9 (only) feature services may allow a remote, unauthenticated attacker to pass and store malicious strings via crafted queries which when accessed could potentially execute arbitrary JavaScript code in the user’s browser.
|
[
"cpe:2.3:a:esri:arcgis_server:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:esri:arcgis_server:10.9.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
CVE-2022-36584
|
In Tenda G3 US_G3V3.0br_V15.11.0.6(7663)_EN_TDE, the getsinglepppuser function has a buffer overflow caused by sscanf.
|
[
"cpe:2.3:o:tenda:g3_firmware:15.11.0.6\\(7663\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-3497
|
An issue was discovered on Wifi-soft UniBox controller 0.x through 2.x devices. The tools/ping Ping feature of the Diagnostic Tools component is vulnerable to Remote Command Execution, allowing an attacker to execute arbitrary system commands on the server with root user privileges. Authentication for accessing this component can be bypassed by using Hard coded credentials.
|
[
"cpe:2.3:o:indionetworks:unibox_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2003-0659
|
Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-7gq6-cq6r-rrpx
|
In the Linux kernel, the following vulnerability has been resolved:uio: Fix use-after-free in uio_opencore-1 core-2uio_unregister_device uio_open
idev = idr_find()
device_unregister(&idev->dev)
put_device(&idev->dev)
uio_device_release
get_device(&idev->dev)
kfree(idev)
uio_free_minor(minor)
uio_release
put_device(&idev->dev)
kfree(idev)In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev->dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:After core-1 kfree idev, the core-2 will do use-after-free for idev.When core-2 do uio_release and put_device, the idev will be double
freed.To address this issue, we can get idev atomic & inc idev reference with
minor_lock.
|
[] | null | 7.8 | null | null |
|
CVE-2016-8619
|
The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
|
[
"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-6vrg-rvc9-7gxh
|
A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
|
[] | null | 9.8 | null | null |
|
GHSA-pcj3-p7wg-9c68
|
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. Directory traversal can occur via the system logs download mechanism.
|
[] | null | 7.5 | null | null |
|
CVE-2011-0097
|
Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka "Excel Integer Overrun Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:-:-:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-41672
|
WordPress Hide admin notices – Admin Notification Center Plugin <= 2.3.2 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Rémi Leclercq Hide admin notices – Admin Notification Center plugin <= 2.3.2 versions.
|
[
"cpe:2.3:a:remileclercq:hide_admin_notices_-_admin_notification_center_plugin:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2001-0121
|
ImageCast Control Center 4.1.0 allows remote attackers to cause a denial of service (resource exhaustion or system crash) via a long string to port 12002.
|
[
"cpe:2.3:a:storagesoft:imagecast_ic3:4.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-32558
|
The use of the deprecated API `process.binding()` can bypass the permission model through path traversal.
This vulnerability affects all users using the experimental permission model in Node.js 20.x.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
|
[
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-w3p6-2cc8-h63h
|
SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd.
|
[] | null | null | null | null |
|
CVE-2004-0707
|
SQL injection vulnerability in editusers.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allows remote attackers with privileges to grant membership to any group to execute arbitrary SQL.
|
[
"cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2qvh-8qj4-8q76
|
A vulnerability was found in PHPGurukul Company Visitor Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file search-visitor.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251377 was assigned to this vulnerability.
|
[] | null | 6.3 | null | null |
|
CVE-2019-10320
|
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
|
[
"cpe:2.3:a:jenkins:credentials:*:*:*:*:*:jenkins:*:*"
] | null | null | 4.3 | 4 |
|
CVE-2018-8790
|
Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM.
|
[
"cpe:2.3:a:checkpoint:zonealarm:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-95x7-mh78-7w2r
|
OpenFGA subject to Information Disclosure via streamed-list-objects endpoint
|
OverviewDuring our internal security assessment, it was discovered that `streamed-list-objects` endpoint was not validating the authorization header resulting in the disclosure of objects in the store.Am I Affected?You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or prior and you are exposing the OpenFGA service to the internet.How to fix that?Upgrade to version `v0.2.4`.Backward CompatibilityThis update is backward compatible.
|
[] | null | 5.3 | null | null |
CVE-2023-22799
|
A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.
|
[
"cpe:2.3:a:rubyonrails:globalid:*:*:*:*:*:ruby:*:*"
] | null | 7.5 | null | null |
|
GHSA-qr9m-mrgx-pv4r
|
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
|
[] | null | 6.2 | null | null |
|
GHSA-q8hf-gfmq-m739
|
A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. This issue affects some unknown processing of the file users/register-complaint.php of the component Lodge Complaint Section. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254723.
|
[] | null | 6.3 | null | null |
|
GHSA-pcq5-fq6m-vxj9
|
Absolute path traversal vulnerability in a certain ActiveX control in officeviewer.ocx 5.1.199.1 in EDraw Office Viewer Component 5.1 allows remote attackers to create or overwrite arbitrary files via a full pathname in the second argument to the HttpDownloadFile method, a different vulnerability than CVE-2007-3168 and CVE-2007-3169.
|
[] | null | null | null | null |
|
GHSA-hjvj-cqch-c25r
|
An ?invalid command? handler issue was discovered in HiNet GPON firmware < I040GWR190731. It allows an attacker to execute arbitrary command through port 3097. CVSS 3.0 Base score 10.0. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null |
|
GHSA-hrhc-vfjq-7844
|
Siemens SICAM PAS before 8.07 does not properly restrict password data in the database, which makes it easier for local users to calculate passwords by leveraging unspecified database privileges.
|
[] | null | null | 6.7 | null |
|
CVE-2021-40988
|
A remote directory traversal vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.9:-:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.7:-:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
GHSA-25cq-qcqp-7fm4
|
A vulnerable code in onCreate of BluetoothScanDialog prior to SMR Aug-2022 Release 1, allows attackers to trick the user to select an unwanted bluetooth device via tapjacking/overlay attack.
|
[] | null | 6.1 | null | null |
|
CVE-2014-9515
|
Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.
|
[
"cpe:2.3:a:dozer_project:dozer:*:*:*:*:*:*:*:*"
] | null | 9.8 | 9.8 | 7.5 |
|
CVE-2023-51425
|
WordPress Rencontre plugin <= 3.10.1 - Unauthenticated Account Takeover vulnerability
|
Improper Privilege Management vulnerability in Jacques Malgrange Rencontre – Dating Site allows Privilege Escalation.This issue affects Rencontre – Dating Site: from n/a through 3.10.1.
|
[
"cpe:2.3:a:jacques_malgrange:rencontre:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2009-4402
|
The default configuration of SQL-Ledger 2.8.24 allows remote attackers to perform unspecified administrative operations by providing an arbitrary password to the admin interface.
|
[
"cpe:2.3:a:sql-ledger:sql-ledger:2.8.24:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pq49-99m6-6f97
|
In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, using an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | null | 9.1 | null | null |
|
GHSA-2qc8-39fh-f2v4
|
Multiple PHP remote file inclusion vulnerabilities in FreeSchool 1.1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the CLASSPATH parameter to (1) bib_form.php, (2) bib_pldetails.php, (3) bib_plform.php, (4) bib_plsearchc.php, (5) bib_plsearchs.php, (6) bib_save.php, (7) bib_searchc.php, (8) bib_searchs.php, (9) edi_form.php, (10) edi_save.php, (11) gen_form.php, (12) gen_save.php, (13) lin_form.php, (14) lin_save.php, (15) luo_form.php, (16) luo_save.php, (17) sog_form.php, or (18) sog_save.php in biblioteca/; (19) cal_insert.php, (20) cal_save.php, or (21) cal_saveactivity.php in calendario/; (22) circolari/cir_save.php; or (23) modulistica/mdl_save.php.
|
[] | null | null | null | null |
|
GHSA-7f4v-2mxr-56hm
|
OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6badae.
|
[] | null | 6.5 | null | null |
|
CVE-2018-14088
|
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounders().
|
[
"cpe:2.3:a:stex_white_list_project:stex_white_list:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2024-30064
|
Windows Kernel Elevation of Privilege Vulnerability
|
Windows Kernel Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2020-7235
|
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cB3?ta= (profile title).
|
[
"cpe:2.3:o:uhp:uhp-100_firmware:3.4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:o:uhp:uhp-100_firmware:3.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:uhp:uhp-100_firmware:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:h:uhp:uhp-100:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2024:0786
|
Red Hat Security Advisory: nss security update
|
nss: vulnerable to Minerva side-channel information leak
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
GHSA-3rg4-hj48-mg5j
|
A vulnerability in the web-based management interface of Cisco SocialMiner could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.
|
[] | null | null | 6.1 | null |
|
GHSA-wwqr-5vx2-25qx
|
In the Linux kernel, the following vulnerability has been resolved:virtio-blk: fix implicit overflow on virtio_max_dma_sizeThe following codes have an implicit conversion from size_t to u32:
(u32)max_size = (size_t)virtio_max_dma_size(vdev);This may lead overflow, Ex (size_t)4G -> (u32)0. Once
virtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX
instead.
|
[] | null | null | null | null |
|
CVE-2022-42947
|
A maliciously crafted X_B file when parsed through Autodesk Maya 2023 and 2022 can be used to write beyond the allocated buffer. This vulnerability can lead to arbitrary code execution.
|
[
"cpe:2.3:a:autodesk:maya:2023:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2016:1603
|
Red Hat Security Advisory: mariadb55-mariadb security update
|
mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.9 | null |
RHSA-2018:0591
|
Red Hat Security Advisory: python-paramiko security and bug fix update
|
python-paramiko: Authentication bypass in transport.py
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 9.8 | null |
CVE-2017-15186
|
Double free vulnerability in FFmpeg 3.3.4 and earlier allows remote attackers to cause a denial of service via a crafted AVI file.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-9780
|
Missing Initialization of a Variable in Wireshark
|
ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:4.4.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2010-1674
|
The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
|
[
"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-wchw-pg72-3f4v
|
The Top and footer bars for announcements, notifications, advertisements, promotions – YooBar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Yoo Bar settings in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-v992-jpvq-942p
|
AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp in Bento4 version 1.5.0-617 has missing NULL checks, leading to a NULL pointer dereference, segmentation fault, and application crash in AP4_Atom::SetType in Core/Ap4Atom.h.
|
[] | null | null | 6.5 | null |
|
GHSA-f8qx-mjcq-wfgx
|
ASP.NET Core Denial of Service Vulnerability
|
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka `ASP.NET Core Denial of Service Vulnerability`.
|
[] | null | 7.5 | null | null |
CVE-2022-44020
|
An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration."
|
[
"cpe:2.3:a:opendev:sushy-tools:*:*:*:*:*:openstack:*:*",
"cpe:2.3:a:opendev:virtualbmc:*:*:*:*:*:openstack:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2017-8072
|
The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
|
[
"cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2011-4221
|
Unspecified vulnerability in Investintech.com Able2Doc and Able2Doc Professional allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document.
|
[
"cpe:2.3:a:investintech:able2doc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:investintech:able2doc:*:*:professional:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-2941
|
Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.