id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-fxrq-jgw4-q4pq | There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. | [] | null | 9.8 | null | null |
|
GHSA-j2cr-jc39-wpx5 | Barberry Security Advisory - regarding x/auth periodic vesting accounts | ImpactIn `PeriodicVestingAccount`, defined in `x/auth`, an attacker can initialize a victim's account as a malicious vesting account, which allows deposits but does not allow withdrawals. When the user then deposits funds into their account, those funds are locked forever, and the user is not able to withdraw them.Patches\>= v0.46.13 for Cosmos SDK v0.46.x
\>= v0.47.3 for Cosmos SDK v0.47.xIf a network backported periodic vesting accounts to earlier versions of the SDK, those networks are affected too.WorkaroundsThere is no workaround for this issue. Upgrade immediately.ReferencesPatched versions release notes: [v0.47.3](https://github.com/cosmos/cosmos-sdk/blob/cfc757dc5043fb2758c47c146d2912fd010c1a45/RELEASE_NOTES.md#cosmos-sdk-v0473-release-notes), [v0.46.13](https://github.com/cosmos/cosmos-sdk/blob/d4b7164de5d8391e6aa644d8ea84e07396dd9653/RELEASE_NOTES.md#cosmos-sdk-v04613-release-notes).[Forum Post](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825) | [] | null | null | null | null |
CVE-2018-1235 | Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege. | [
"cpe:2.3:a:emc:recoverpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2015-0878 | Directory traversal vulnerability in CREAR AL-Mail32 before 1.13d allows remote attackers to write to arbitrary files via a crafted filename of an attachment. | [
"cpe:2.3:a:almail:al-mail32:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2024-22179 | Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data | The application is vulnerable to an unauthenticated parameter
manipulation that allows an attacker to set the credentials to blank
giving her access to the admin panel. Also vulnerable to account
takeover and arbitrary password change. | [
"cpe:2.3:a:electrolink:compact_dab_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:medium_dab_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:high_power_dab_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:compact_fm_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:modular_fm_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:digital_fm_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:vhf_tv_transmitter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electrolink:uhf_tv_transmitter:*:*:*:*:*:*:*:*"
] | 8.7 | 7.5 | null | null |
CVE-2022-29869 | cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. | [
"cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 4.3 |
|
CVE-2024-36029 | mmc: sdhci-msm: pervent access to suspended controller | In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci-msm: pervent access to suspended controller
Generic sdhci code registers LED device and uses host->runtime_suspended
flag to protect access to it. The sdhci-msm driver doesn't set this flag,
which causes a crash when LED is accessed while controller is runtime
suspended. Fix this by setting the flag correctly. | [] | null | null | null | null |
GHSA-jrf9-r4h8-9228 | A buffer overflow can occur in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android when processing a firmware image file. | [] | null | null | 7.8 | null |
|
GHSA-rg2r-4fr3-6jvr | In EMC ViPR SRM, Storage M&R, VNX M&R, and M&R (Watch4Net) for SAS Solution Packs, the Java Management Extensions (JMX) protocol used to communicate between components in the Alerting and/or Compliance components can be leveraged to create a denial of service (DoS) condition. Attackers with knowledge of JMX agent user credentials could potentially exploit this vulnerability to create arbitrary files on the affected system and create a DoS condition by leveraging inherent JMX protocol capabilities. | [] | null | 7.4 | null | null |
|
ICSA-17-220-01 | OSIsoft PI Integrator | An attacker may be able to upload a malicious script that attempts to redirect users to a malicious web site.CVE-2017-9655 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H). An attacker is able to gain privileged access to the system while unauthorized.CVE-2017-9653 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
GHSA-6rhm-fw89-rh2q | It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2. | [] | null | 9.8 | null | null |
|
CVE-2009-2633 | PHP remote file inclusion vulnerability in toolbar_ext.php in the VehicleManager (com_vehiclemanager) component 1.0 Basic for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ordasoft:com_vehiclemanager:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8v6m-wm8j-qpv7 | Deserialization of Untrusted Data vulnerability in PickPlugins Testimonial Slider allows Object Injection. This issue affects Testimonial Slider: from n/a through 2.0.13. | [] | null | 8.8 | null | null |
|
GHSA-q2w9-m8p6-296j | The Application/Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly handle custom polices, which allows local users to bypass intended policy restrictions and access files or directories via unspecified vectors. | [] | null | null | null | null |
|
CVE-2008-3967 | moderation.php in MyBB (aka MyBulletinBoard) before 1.4.1 does not properly check for moderator privileges, which has unknown impact and remote attack vectors. | [
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-50268 | usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() | In the Linux kernel, the following vulnerability has been resolved:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
The "*cmd" variable can be controlled by the user via debugfs. That means
"new_cam" can be as high as 255 while the size of the uc->updated[] array
is UCSI_MAX_ALTMODES (30).
The call tree is:
ucsi_cmd() // val comes from simple_attr_write_xsigned()
-> ucsi_send_command()
-> ucsi_send_command_common()
-> ucsi_run_command() // calls ucsi->ops->sync_control()
-> ucsi_ccg_sync_control() | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-838w-34f9-4566 | The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files. | [] | null | null | null | null |
|
CVE-2012-1158 | Moodle before 2.2.2 has a course information leak in gradebook where users are able to see hidden grade items in export | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-wcfm-6r83-67px | The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop. | [] | null | null | null | null |
|
CVE-2020-11265 | Information disclosure issue due to lack of validation of pointer arguments passed to TZ BSP in Snapdragon Wired Infrastructure and Networking | [
"cpe:2.3:o:qualcomm:ar7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar7420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca10901_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca10901:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn3018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn3018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1922_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1922:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1952_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-23488 | Files of archived channels accessible with the “Allow users to view archived channels” option disabled | Mattermost fails to properly restrict the access of files attached to posts in an archived channel, resulting in members being able to access files of archived channels even if the “Allow users to view archived channels” option is disabled.
| [] | null | 3.1 | null | null |
GHSA-pf7q-pwfc-88m3 | An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c. | [] | null | 6.5 | null | null |
|
CVE-2022-4481 | Mesmerize Companion < 1.6.135 - Contributor+ Stored XSS | The Mesmerize Companion WordPress plugin before 1.6.135 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [
"cpe:2.3:a:extendthemes:mesmerize_companion:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
RHSA-2020:2664 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
CVE-2016-10411 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, and SD 835, RTP daemon crashes and terminates VT call when UE receives RTCP unknown APP packet report which caused the parser to miss an end of RTCP packet length and go on forever looking for it, even going beyond the limits of the RTCP Packet length. | [
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-ph5r-2xrj-457h | An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service. | [] | null | 5.5 | null | null |
|
GHSA-v3m3-hp7j-gg84 | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the cloud1234 password for the a1@chopin account default credentials. | [] | null | null | null | null |
|
CVE-2020-4599 | IBM Security Guardium Insights 2.0.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184824. | [
"cpe:2.3:a:ibm:security_guardium_insights:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-2022-28625 | A local disclosure of sensitive information vulnerability was discovered in HPE OneView version(s): Prior to 7.0 or 6.60.01. A low privileged user could locally exploit this vulnerability to disclose sensitive information resulting in a complete loss of confidentiality, integrity, and availability. To exploit this vulnerability, HPE OneView must be configured with credential access to external repositories. HPE has provided a software update to resolve this vulnerability in HPE OneView. | [
"cpe:2.3:a:hp:oneview:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-4xh9-wg59-p7xj | Google Chrome before 7.0.517.41 does not properly perform autofill operations for forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document. | [] | null | null | null | null |
|
cisco-sa-radius-spoofing-july-2024-87cCDwZ3 | RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024 | On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
This vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks ["https://www.kb.cert.org/vuls/id/456537"].
| [] | null | 8.1 | null | null |
CVE-2020-7330 | Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial | Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial prior to 4.0.176.1 allows local users to schedule tasks which call malicious software to execute with elevated privileges via editing of environment variables | [
"cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2023-25399 | A refcounting issue which leads to potential memory leak was discovered in scipy commit 8627df31ab in Py_FindObjects() function. Note: This is disputed as a bug and not a vulnerability. SciPy is not designed to be exposed to untrusted users or data directly. | [
"cpe:2.3:a:scipy:scipy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:scipy:scipy:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2013-1591 | Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop. | [
"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-fff8-vch6-26xx | Buffer overflow in the fetchsms function in the SMS handling module (libsms_getsms.c) in OpenSER 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SMS message, triggering memory corruption when the "beginning" buffer is copied to the third (pdu) argument. | [] | null | null | null | null |
|
CVE-2020-12700 | The direct_mail extension through 5.2.3 for TYPO3 allows Information Disclosure via a newsletter subscriber data Special Query. | [
"cpe:2.3:a:dkd:direct_mail:*:*:*:*:*:typo3:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2021-30456 | An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function. | [
"cpe:2.3:a:id-map_project:id-map:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-7f5c-7r4j-r8cc | Unrestricted file upload vulnerability in index.php/Attach in WikyBlog 1.7.3rc2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension using the uploadform action, then accessing it via a direct request to the file in userfiles/[username]/uploaded/. | [] | null | null | null | null |
|
CVE-2023-44482 | Leave Management System Project v1.0 - Multiple Authenticated SQL Injections (SQLi) | Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setsickleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
| [
"cpe:2.3:a:projectworlds:leave_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-8v5q-r6pr-xg3j | A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed. | [] | null | null | null | null |
|
CVE-2018-8457 | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8456, CVE-2018-8459. | [
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2007-0694 | Cross-site scripting (XSS) vulnerability in footer.php in DGNews 2.1 allows remote attackers to inject arbitrary web script or HTML via the copyright parameter. | [
"cpe:2.3:a:dian_gemilang:dgnews:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-8256 | ColdFusion versions Update 6 and earlier have an insecure inherited permissions of default installation directory vulnerability. Successful exploitation could lead to privilege escalation. | [
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-7j7m-w4qx-7vmf | A Cross-Site Request Forgery (CSRF) in the component /admin/users/user.form of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary operations via a crafted GET request. | [] | null | 8 | null | null |
|
CVE-2010-3921 | Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.35 and 5.x before 5.04 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:sixapart:movabletype:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movabletype:5.031:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
ICSA-24-072-01 | Schneider Electric EcoStruxure Power Design | All versions of Schneider Electric EcoStruxure Power Design - Ecodial NL, INT, and FR deserializes untrusted data which could allow an attacker to perform code execution when a malicious project file is loaded into the application by a valid user. | [] | null | 7.8 | null | null |
CVE-2000-1006 | Microsoft Exchange Server 5.5 does not properly handle a MIME header with a blank charset specified, which allows remote attackers to cause a denial of service via a charset="" command, aka the "Malformed MIME Header" vulnerability. | [
"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-25427 | XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page | A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | [] | 8.6 | null | null | null |
GHSA-9j7p-fvvp-cp57 | libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL. | [] | null | 5.9 | null | null |
|
GHSA-cqfx-xvr4-7hr2 | RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the attach_id parameter at /Bulletin/AttachDownLoad.aspx. | [] | null | 8.1 | null | null |
|
GHSA-w3h3-5p95-fv5g | Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-9mf6-346h-8vjv | Windows Kernel Elevation of Privilege Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-jc83-hrxf-cqm9 | Improper permissions for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
CVE-2009-1485 | The logging feature in eMule Plus before 1.2e allows remote attackers to cause a denial of service (infinite loop) via unspecified attack vectors. | [
"cpe:2.3:a:aemuleplus:emule_plus:1.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1.h:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1a:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1b:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1c:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1d:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1e:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1f:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1g:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1i:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1j:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1k:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1l:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1m:*:*:*:*:*:*:*",
"cpe:2.3:a:emuleplus:emule_plus:1o:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2015:1694 | Red Hat Security Advisory: gdk-pixbuf2 security update | Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2021-33095 | Unquoted search path in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_m15_laptop_kit_keyboard_led_service_driver_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-rfqp-qc69-jhvm | Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. | [] | null | 6.5 | null | null |
|
GHSA-3wjx-vqf3-h2px | In vdec, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08163896; Issue ID: ALPS08163896. | [] | null | 6.7 | null | null |
|
GHSA-7r5h-rj9j-3ch2 | Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands. | [] | null | null | null | null |
|
GHSA-4v59-chwx-688h | Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index. | [] | null | null | null | null |
|
CVE-2024-0209 | NULL Pointer Dereference in Wireshark | IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:4.2.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-vj8p-4j9q-q943 | The EPL Hat Trick (aka com.hat.trick.goal) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-5x2w-qcvq-rh6f | Multiple SQL injection vulnerabilities in the WonderPlugin Audio Player plugin before 2.1 for WordPress allow (1) remote authenticated users to execute arbitrary SQL commands via the item[id] parameter in a wonderplugin_audio_save_item action to wp-admin/admin-ajax.php or remote administrators to execute arbitrary SQL commands via the itemid parameter in the (2) wonderplugin_audio_show_item, (3) wonderplugin_audio_show_items, or (4) wonderplugin_audio_edit_item page to wp-admin/admin.php. | [] | null | null | null | null |
|
CVE-2024-54802 | In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header. | [] | null | 9.8 | null | null |
|
CVE-2018-8960 | The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-26:q16:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2020-35561 | SSRF in variuos products of MB connect line and Helmholz | An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports. | [
"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-rx5g-g7vf-gvrq | Unspecified vulnerability in the NinjaXplorer component before 1.0.7 for Joomla! has unknown impact and attack vectors. | [] | null | null | null | null |
|
CVE-2024-27224 | In strncpy of strncpy.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-39392 | Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten. | [
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2008-0055 | Foundation in Apple Mac OS X 10.4.11 creates world-writable directories while NSFileManager copies files recursively and only modifies the permissions afterward, which allows local users to modify copied files to cause a denial of service and possibly gain privileges. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2023-6044 | A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges. | [
"cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-99w3-f2h7-vqxf | An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32769717. | [] | null | null | 7 | null |
|
CVE-2007-5466 | Multiple buffer overflows in eXtremail 2.1.1 and earlier allow remote attackers to (1) have an unknown impact by sending multiple long strings to the IMAP port (143/tcp); (2) execute arbitrary code via a long string in an IMAP AUTHENTICATE PLAIN action, involving the ifParseAuthPlain function; (3) execute arbitrary code via a long LOGIN command to the admin interface port (4501/tcp); or (4) execute arbitrary code via a long string in an IMAP AUTHENTICATE LOGIN (aka CRAM-MD5 authentication) action, involving the ifProcImapAuth1 function. | [
"cpe:2.3:a:extremail:extremail:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2025-4818 | SourceCodester Doctor's Appointment System GET Parameter delete-doctor.php sql injection | A vulnerability was found in SourceCodester Doctor's Appointment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/delete-doctor.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-762p-xx25-g6mq | In the Linux kernel, the following vulnerability has been resolved:Revert "sched/fair: Make sure to try to detach at least one movable task"This reverts commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06.b0defa7ae03ec changed the load balancing logic to ignore env.max_loop if
all tasks examined to that point were pinned. The goal of the patch was
to make it more likely to be able to detach a task buried in a long list
of pinned tasks. However, this has the unfortunate side effect of
creating an O(n) iteration in detach_tasks(), as we now must fully
iterate every task on a cpu if all or most are pinned. Since this load
balance code is done with rq lock held, and often in softirq context, it
is very easy to trigger hard lockups. We observed such hard lockups with
a user who affined O(10k) threads to a single cpu.When I discussed this with Vincent he initially suggested that we keep
the limit on the number of tasks to detach, but increase the number of
tasks we can search. However, after some back and forth on the mailing
list, he recommended we instead revert the original patch, as it seems
likely no one was actually getting hit by the original issue. | [] | null | 5.5 | null | null |
|
CVE-2022-24872 | Improper Access Control in shopware | Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue. | [
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-vq28-pr6f-gpm4 | A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. | [] | null | null | 9.8 | null |
|
GHSA-4377-w6r6-fpff | A cross-site scripting (XSS) issue in DomainMOD below v4.12.0 allows remote attackers to inject JavaScript code via admin/domain-fields/edit.php and the cdfid parameter. | [] | null | 6.6 | null | null |
|
CVE-2024-11054 | SourceCodester Simple Music Cloud Community System ajax.php unrestricted upload | A vulnerability classified as critical was found in SourceCodester Simple Music Cloud Community System 1.0. This vulnerability affects unknown code of the file /music/ajax.php?action=signup. The manipulation of the argument pp leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:simple_music_cloud_community_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_music_cloud_community_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-cwwm-5pm5-mpxq | IBM OmniFind Enterprise Edition 8.x and 9.x does not properly restrict the cookie path of administrator (aka ESAdmin) cookies, which might allow remote attackers to bypass authentication by leveraging access to other pages on the web site. | [] | null | null | null | null |
|
CVE-2014-5927 | The FastCustomer -- Fast Customer (aka www.fastcustomer.com) application 3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:fastcustomer:fastcustomer_--_fast_customer:3:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-mmmq-84hv-hmpw | Remote Desktop Client Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-7w3j-vcgc-cj2f | IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398. | [] | null | null | null | null |
|
CVE-2025-31477 | Improper Scope Validation in the open Endpoint of tauri-plugin-shell | The Tauri shell plugin allows access to the system shell. Prior to 2.2.1, the Tauri shell plugin exposes functionality to execute code and open programs on the system. The open endpoint of this plugin is designed to allow open functionality with the system opener (e.g. xdg-open on Linux). This was meant to be restricted to a reasonable number of protocols like https or mailto by default. This default restriction was not functional due to improper validation of the allowed protocols, allowing for potentially dangerous protocols like file://, smb://, or nfs:// and others to be opened by the system registered protocol handler. By passing untrusted user input to the open endpoint these potentially dangerous protocols can be abused to gain remote code execution on the system. This either requires direct exposure of the endpoint to application users or code execution in the frontend of a Tauri application. This vulnerability is fixed in 2.2.1. | [] | 9.3 | null | null | null |
GHSA-8m3r-mrww-j5pv | The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. | [] | null | null | null | null |
|
GHSA-7722-hv28-cff7 | SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7966. | [] | null | null | 7.8 | null |
|
RHSA-2022:4994 | Red Hat Security Advisory: xz security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.8 | null | null |
GHSA-r34m-4f53-rqg5 | Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=edit&roleid=. | [] | null | 9.8 | null | null |
|
RHSA-2020:2618 | Red Hat Security Advisory: Red Hat AMQ Streams 1.5.0 release and security update | ant: insecure temporary file vulnerability netty: compression/decompression codecs don't enforce limits on buffer allocation sizes | [
"cpe:/a:redhat:amq_streams:1"
] | null | 7.5 | null | null |
CVE-2020-1950 | A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23. | [
"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-rfh6-mg6h-h668 | xwiki-platform-administration-ui vulnerable to privilege escalation | ImpactAny user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default.Reproduction steps are described in https://jira.xwiki.org/browse/XWIKI-20261PatchesThe vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.WorkaroundsThe issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/f1e310826a19acdcdecdecdcfe171d21f24d6ede) on `XWiki.AdminFieldsDisplaySheet`.For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | [] | null | 9.9 | null | null |
CVE-2025-4248 | SourceCodester Simple To-Do List System complete_task.php sql injection | A vulnerability has been found in SourceCodester Simple To-Do List System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /complete_task.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2019-19297 | A vulnerability has been identified in SiNVR/SiVMS Video Server (All versions < V5.0.0). The streaming service (default port 5410/tcp) of the SiVMS/SiNVR Video Server
contains a path traversal vulnerability, that could allow an
unauthenticated remote attacker to access and download arbitrary files from the server. | [
"cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2015-7073 | Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SSL handshake. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-45cf-5rxq-xpqr | IBM Intelligent Operations Center V5.1.0 - V5.2.0, IBM Intelligent Operations Center for Emergency Management V5.1.0 - V5.1.0.6, and IBM Water Operations for Waternamics V5.1.0 - V5.2.1.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 161201. | [] | null | 7.5 | null | null |
|
GHSA-6mqh-rwpp-6xcj | A vulnerability has been identified in Mendix Workflow Commons (All versions < V2.4.0). Affected versions of the module improperly handle access control for some module entities. This could allow authenticated remote attackers to read or delete sensitive information. | [] | null | 8.1 | null | null |
|
CVE-2017-15268 | Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-x2hh-j2qq-439g | Cross-site scripting (XSS) vulnerability in index.php in JBook 1.3 allows remote attackers to inject arbitrary web script or HTML via the page parameter. | [] | null | null | null | null |
|
GHSA-796g-c5p5-hfrr | An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges | [] | null | 9.8 | null | null |
|
CVE-2021-35573 | Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.