id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-fxrq-jgw4-q4pq
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow.
[]
null
9.8
null
null
GHSA-j2cr-jc39-wpx5
Barberry Security Advisory - regarding x/auth periodic vesting accounts
ImpactIn `PeriodicVestingAccount`, defined in `x/auth`, an attacker can initialize a victim's account as a malicious vesting account, which allows deposits but does not allow withdrawals. When the user then deposits funds into their account, those funds are locked forever, and the user is not able to withdraw them.Patches\>= v0.46.13 for Cosmos SDK v0.46.x \>= v0.47.3 for Cosmos SDK v0.47.xIf a network backported periodic vesting accounts to earlier versions of the SDK, those networks are affected too.WorkaroundsThere is no workaround for this issue. Upgrade immediately.ReferencesPatched versions release notes: [v0.47.3](https://github.com/cosmos/cosmos-sdk/blob/cfc757dc5043fb2758c47c146d2912fd010c1a45/RELEASE_NOTES.md#cosmos-sdk-v0473-release-notes), [v0.46.13](https://github.com/cosmos/cosmos-sdk/blob/d4b7164de5d8391e6aa644d8ea84e07396dd9653/RELEASE_NOTES.md#cosmos-sdk-v04613-release-notes).[Forum Post](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825)
[]
null
null
null
null
CVE-2018-1235
Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege.
[ "cpe:2.3:a:emc:recoverpoint:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2015-0878
Directory traversal vulnerability in CREAR AL-Mail32 before 1.13d allows remote attackers to write to arbitrary files via a crafted filename of an attachment.
[ "cpe:2.3:a:almail:al-mail32:*:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2024-22179
Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data
The application is vulnerable to an unauthenticated parameter manipulation that allows an attacker to set the credentials to blank giving her access to the admin panel. Also vulnerable to account takeover and arbitrary password change.
[ "cpe:2.3:a:electrolink:compact_dab_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:medium_dab_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:high_power_dab_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:compact_fm_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:modular_fm_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:digital_fm_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:vhf_tv_transmitter:*:*:*:*:*:*:*:*", "cpe:2.3:a:electrolink:uhf_tv_transmitter:*:*:*:*:*:*:*:*" ]
8.7
7.5
null
null
CVE-2022-29869
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
[ "cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
5.3
null
4.3
CVE-2024-36029
mmc: sdhci-msm: pervent access to suspended controller
In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-msm: pervent access to suspended controller Generic sdhci code registers LED device and uses host->runtime_suspended flag to protect access to it. The sdhci-msm driver doesn't set this flag, which causes a crash when LED is accessed while controller is runtime suspended. Fix this by setting the flag correctly.
[]
null
null
null
null
GHSA-jrf9-r4h8-9228
A buffer overflow can occur in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android when processing a firmware image file.
[]
null
null
7.8
null
GHSA-rg2r-4fr3-6jvr
In EMC ViPR SRM, Storage M&R, VNX M&R, and M&R (Watch4Net) for SAS Solution Packs, the Java Management Extensions (JMX) protocol used to communicate between components in the Alerting and/or Compliance components can be leveraged to create a denial of service (DoS) condition. Attackers with knowledge of JMX agent user credentials could potentially exploit this vulnerability to create arbitrary files on the affected system and create a DoS condition by leveraging inherent JMX protocol capabilities.
[]
null
7.4
null
null
ICSA-17-220-01
OSIsoft PI Integrator
An attacker may be able to upload a malicious script that attempts to redirect users to a malicious web site.CVE-2017-9655 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H). An attacker is able to gain privileged access to the system while unauthorized.CVE-2017-9653 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
GHSA-6rhm-fw89-rh2q
It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
[]
null
9.8
null
null
CVE-2009-2633
PHP remote file inclusion vulnerability in toolbar_ext.php in the VehicleManager (com_vehiclemanager) component 1.0 Basic for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[ "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:ordasoft:com_vehiclemanager:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-8v6m-wm8j-qpv7
Deserialization of Untrusted Data vulnerability in PickPlugins Testimonial Slider allows Object Injection. This issue affects Testimonial Slider: from n/a through 2.0.13.
[]
null
8.8
null
null
GHSA-q2w9-m8p6-296j
The Application/Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly handle custom polices, which allows local users to bypass intended policy restrictions and access files or directories via unspecified vectors.
[]
null
null
null
null
CVE-2008-3967
moderation.php in MyBB (aka MyBulletinBoard) before 1.4.1 does not properly check for moderator privileges, which has unknown impact and remote attack vectors.
[ "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-50268
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc->updated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -> ucsi_send_command() -> ucsi_send_command_common() -> ucsi_run_command() // calls ucsi->ops->sync_control() -> ucsi_ccg_sync_control()
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-838w-34f9-4566
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.
[]
null
null
null
null
CVE-2012-1158
Moodle before 2.2.2 has a course information leak in gradebook where users are able to see hidden grade items in export
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*" ]
null
4.3
null
4
GHSA-wcfm-6r83-67px
The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
[]
null
null
null
null
CVE-2020-11265
Information disclosure issue due to lack of validation of pointer arguments passed to TZ BSP in Snapdragon Wired Infrastructure and Networking
[ "cpe:2.3:o:qualcomm:ar7420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar9580_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar9580:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca10901_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca10901:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca7520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca7550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn3018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn3018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfe1922_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfe1922:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfe1952_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfe1952:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2024-23488
Files of archived channels accessible with the “Allow users to view archived channels” option disabled
Mattermost fails to properly restrict the access of files attached to posts in an archived channel, resulting in members being able to access files of archived channels even if the “Allow users to view archived channels” option is disabled.
[]
null
3.1
null
null
GHSA-pf7q-pwfc-88m3
An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.
[]
null
6.5
null
null
CVE-2022-4481
Mesmerize Companion < 1.6.135 - Contributor+ Stored XSS
The Mesmerize Companion WordPress plugin before 1.6.135 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[ "cpe:2.3:a:extendthemes:mesmerize_companion:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
RHSA-2020:2664
Red Hat Security Advisory: kernel security and bug fix update
Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
CVE-2016-10411
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, and SD 835, RTP daemon crashes and terminates VT call when UE receives RTCP unknown APP packet report which caused the parser to miss an end of RTCP packet length and go on forever looking for it, even going beyond the limits of the RTCP Packet length.
[ "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
GHSA-ph5r-2xrj-457h
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service.
[]
null
5.5
null
null
GHSA-v3m3-hp7j-gg84
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the cloud1234 password for the a1@chopin account default credentials.
[]
null
null
null
null
CVE-2020-4599
IBM Security Guardium Insights 2.0.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184824.
[ "cpe:2.3:a:ibm:security_guardium_insights:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2022-28625
A local disclosure of sensitive information vulnerability was discovered in HPE OneView version(s): Prior to 7.0 or 6.60.01. A low privileged user could locally exploit this vulnerability to disclose sensitive information resulting in a complete loss of confidentiality, integrity, and availability. To exploit this vulnerability, HPE OneView must be configured with credential access to external repositories. HPE has provided a software update to resolve this vulnerability in HPE OneView.
[ "cpe:2.3:a:hp:oneview:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-4xh9-wg59-p7xj
Google Chrome before 7.0.517.41 does not properly perform autofill operations for forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document.
[]
null
null
null
null
cisco-sa-radius-spoofing-july-2024-87cCDwZ3
RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024
On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol: CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. This vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks ["https://www.kb.cert.org/vuls/id/456537"].
[]
null
8.1
null
null
CVE-2020-7330
Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial
Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial prior to 4.0.176.1 allows local users to schedule tasks which call malicious software to execute with elevated privileges via editing of environment variables
[ "cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-25399
A refcounting issue which leads to potential memory leak was discovered in scipy commit 8627df31ab in Py_FindObjects() function. Note: This is disputed as a bug and not a vulnerability. SciPy is not designed to be exposed to untrusted users or data directly.
[ "cpe:2.3:a:scipy:scipy:-:*:*:*:*:*:*:*", "cpe:2.3:a:scipy:scipy:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2013-1591
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
[ "cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-fff8-vch6-26xx
Buffer overflow in the fetchsms function in the SMS handling module (libsms_getsms.c) in OpenSER 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SMS message, triggering memory corruption when the "beginning" buffer is copied to the third (pdu) argument.
[]
null
null
null
null
CVE-2020-12700
The direct_mail extension through 5.2.3 for TYPO3 allows Information Disclosure via a newsletter subscriber data Special Query.
[ "cpe:2.3:a:dkd:direct_mail:*:*:*:*:*:typo3:*:*" ]
null
4.3
null
4
CVE-2021-30456
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function.
[ "cpe:2.3:a:id-map_project:id-map:*:*:*:*:*:rust:*:*" ]
null
9.8
null
7.5
GHSA-7f5c-7r4j-r8cc
Unrestricted file upload vulnerability in index.php/Attach in WikyBlog 1.7.3rc2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension using the uploadform action, then accessing it via a direct request to the file in userfiles/[username]/uploaded/.
[]
null
null
null
null
CVE-2023-44482
Leave Management System Project v1.0 - Multiple Authenticated SQL Injections (SQLi)
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setsickleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
[ "cpe:2.3:a:projectworlds:leave_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-8v5q-r6pr-xg3j
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed.
[]
null
null
null
null
CVE-2018-8457
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8456, CVE-2018-8459.
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
CVE-2007-0694
Cross-site scripting (XSS) vulnerability in footer.php in DGNews 2.1 allows remote attackers to inject arbitrary web script or HTML via the copyright parameter.
[ "cpe:2.3:a:dian_gemilang:dgnews:2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2019-8256
ColdFusion versions Update 6 and earlier have an insecure inherited permissions of default installation directory vulnerability. Successful exploitation could lead to privilege escalation.
[ "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-7j7m-w4qx-7vmf
A Cross-Site Request Forgery (CSRF) in the component /admin/users/user.form of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary operations via a crafted GET request.
[]
null
8
null
null
CVE-2010-3921
Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.35 and 5.x before 5.04 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:sixapart:movabletype:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.23:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.25:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.26:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.31:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.32:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.33:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.34:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:4.261:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:sixapart:movabletype:5.031:*:*:*:*:*:*:*" ]
null
null
null
4.3
ICSA-24-072-01
Schneider Electric EcoStruxure Power Design
All versions of Schneider Electric EcoStruxure Power Design - Ecodial NL, INT, and FR deserializes untrusted data which could allow an attacker to perform code execution when a malicious project file is loaded into the application by a valid user.
[]
null
7.8
null
null
CVE-2000-1006
Microsoft Exchange Server 5.5 does not properly handle a MIME header with a blank charset specified, which allows remote attackers to cause a denial of service via a charset="" command, aka the "Malformed MIME Header" vulnerability.
[ "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*" ]
null
null
null
5
CVE-2025-25427
XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page
A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
[]
8.6
null
null
null
GHSA-9j7p-fvvp-cp57
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
[]
null
5.9
null
null
GHSA-cqfx-xvr4-7hr2
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the attach_id parameter at /Bulletin/AttachDownLoad.aspx.
[]
null
8.1
null
null
GHSA-w3h3-5p95-fv5g
Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
[]
null
null
null
null
GHSA-9mf6-346h-8vjv
Windows Kernel Elevation of Privilege Vulnerability
[]
null
8.8
null
null
GHSA-jc83-hrxf-cqm9
Improper permissions for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
CVE-2009-1485
The logging feature in eMule Plus before 1.2e allows remote attackers to cause a denial of service (infinite loop) via unspecified attack vectors.
[ "cpe:2.3:a:aemuleplus:emule_plus:1.1b:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:*:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1a:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1c:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1d:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1e:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.1f:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.2a:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.2b:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.2d:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1.h:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1a:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1b:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1c:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1d:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1e:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1f:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1g:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1i:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1j:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1k:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1l:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1m:*:*:*:*:*:*:*", "cpe:2.3:a:emuleplus:emule_plus:1o:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2015:1694
Red Hat Security Advisory: gdk-pixbuf2 security update
Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2021-33095
Unquoted search path in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:nuc_m15_laptop_kit_keyboard_led_service_driver_pack:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-rfqp-qc69-jhvm
Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
[]
null
6.5
null
null
GHSA-3wjx-vqf3-h2px
In vdec, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08163896; Issue ID: ALPS08163896.
[]
null
6.7
null
null
GHSA-7r5h-rj9j-3ch2
Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands.
[]
null
null
null
null
GHSA-4v59-chwx-688h
Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index.
[]
null
null
null
null
CVE-2024-0209
NULL Pointer Dereference in Wireshark
IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:4.2.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-vj8p-4j9q-q943
The EPL Hat Trick (aka com.hat.trick.goal) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-5x2w-qcvq-rh6f
Multiple SQL injection vulnerabilities in the WonderPlugin Audio Player plugin before 2.1 for WordPress allow (1) remote authenticated users to execute arbitrary SQL commands via the item[id] parameter in a wonderplugin_audio_save_item action to wp-admin/admin-ajax.php or remote administrators to execute arbitrary SQL commands via the itemid parameter in the (2) wonderplugin_audio_show_item, (3) wonderplugin_audio_show_items, or (4) wonderplugin_audio_edit_item page to wp-admin/admin.php.
[]
null
null
null
null
CVE-2024-54802
In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header.
[]
null
9.8
null
null
CVE-2018-8960
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-26:q16:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
8.8
6.8
CVE-2020-35561
SSRF in variuos products of MB connect line and Helmholz
An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.
[ "cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*", "cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*", "cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*", "cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-rx5g-g7vf-gvrq
Unspecified vulnerability in the NinjaXplorer component before 1.0.7 for Joomla! has unknown impact and attack vectors.
[]
null
null
null
null
CVE-2024-27224
In strncpy of strncpy.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-39392
Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten.
[ "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2008-0055
Foundation in Apple Mac OS X 10.4.11 creates world-writable directories while NSFileManager copies files recursively and only modifies the permissions afterward, which allows local users to modify copied files to cause a denial of service and possibly gain privileges.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2023-6044
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.
[ "cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-99w3-f2h7-vqxf
An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32769717.
[]
null
null
7
null
CVE-2007-5466
Multiple buffer overflows in eXtremail 2.1.1 and earlier allow remote attackers to (1) have an unknown impact by sending multiple long strings to the IMAP port (143/tcp); (2) execute arbitrary code via a long string in an IMAP AUTHENTICATE PLAIN action, involving the ifParseAuthPlain function; (3) execute arbitrary code via a long LOGIN command to the admin interface port (4501/tcp); or (4) execute arbitrary code via a long string in an IMAP AUTHENTICATE LOGIN (aka CRAM-MD5 authentication) action, involving the ifProcImapAuth1 function.
[ "cpe:2.3:a:extremail:extremail:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2025-4818
SourceCodester Doctor's Appointment System GET Parameter delete-doctor.php sql injection
A vulnerability was found in SourceCodester Doctor's Appointment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/delete-doctor.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
GHSA-762p-xx25-g6mq
In the Linux kernel, the following vulnerability has been resolved:Revert "sched/fair: Make sure to try to detach at least one movable task"This reverts commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06.b0defa7ae03ec changed the load balancing logic to ignore env.max_loop if all tasks examined to that point were pinned. The goal of the patch was to make it more likely to be able to detach a task buried in a long list of pinned tasks. However, this has the unfortunate side effect of creating an O(n) iteration in detach_tasks(), as we now must fully iterate every task on a cpu if all or most are pinned. Since this load balance code is done with rq lock held, and often in softirq context, it is very easy to trigger hard lockups. We observed such hard lockups with a user who affined O(10k) threads to a single cpu.When I discussed this with Vincent he initially suggested that we keep the limit on the number of tasks to detach, but increase the number of tasks we can search. However, after some back and forth on the mailing list, he recommended we instead revert the original patch, as it seems likely no one was actually getting hit by the original issue.
[]
null
5.5
null
null
CVE-2022-24872
Improper Access Control in shopware
Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.
[ "cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-vq28-pr6f-gpm4
A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
[]
null
null
9.8
null
GHSA-4377-w6r6-fpff
A cross-site scripting (XSS) issue in DomainMOD below v4.12.0 allows remote attackers to inject JavaScript code via admin/domain-fields/edit.php and the cdfid parameter.
[]
null
6.6
null
null
CVE-2024-11054
SourceCodester Simple Music Cloud Community System ajax.php unrestricted upload
A vulnerability classified as critical was found in SourceCodester Simple Music Cloud Community System 1.0. This vulnerability affects unknown code of the file /music/ajax.php?action=signup. The manipulation of the argument pp leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:simple_music_cloud_community_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:simple_music_cloud_community_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-cwwm-5pm5-mpxq
IBM OmniFind Enterprise Edition 8.x and 9.x does not properly restrict the cookie path of administrator (aka ESAdmin) cookies, which might allow remote attackers to bypass authentication by leveraging access to other pages on the web site.
[]
null
null
null
null
CVE-2014-5927
The FastCustomer -- Fast Customer (aka www.fastcustomer.com) application 3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:fastcustomer:fastcustomer_--_fast_customer:3:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-mmmq-84hv-hmpw
Remote Desktop Client Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-7w3j-vcgc-cj2f
IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.
[]
null
null
null
null
CVE-2025-31477
Improper Scope Validation in the open Endpoint of tauri-plugin-shell
The Tauri shell plugin allows access to the system shell. Prior to 2.2.1, the Tauri shell plugin exposes functionality to execute code and open programs on the system. The open endpoint of this plugin is designed to allow open functionality with the system opener (e.g. xdg-open on Linux). This was meant to be restricted to a reasonable number of protocols like https or mailto by default. This default restriction was not functional due to improper validation of the allowed protocols, allowing for potentially dangerous protocols like file://, smb://, or nfs:// and others to be opened by the system registered protocol handler. By passing untrusted user input to the open endpoint these potentially dangerous protocols can be abused to gain remote code execution on the system. This either requires direct exposure of the endpoint to application users or code execution in the frontend of a Tauri application. This vulnerability is fixed in 2.2.1.
[]
9.3
null
null
null
GHSA-8m3r-mrww-j5pv
The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.
[]
null
null
null
null
GHSA-7722-hv28-cff7
SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7966.
[]
null
null
7.8
null
RHSA-2022:4994
Red Hat Security Advisory: xz security update
gzip: arbitrary-file-write vulnerability
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.8
null
null
GHSA-r34m-4f53-rqg5
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=edit&roleid=.
[]
null
9.8
null
null
RHSA-2020:2618
Red Hat Security Advisory: Red Hat AMQ Streams 1.5.0 release and security update
ant: insecure temporary file vulnerability netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
[ "cpe:/a:redhat:amq_streams:1" ]
null
7.5
null
null
CVE-2020-1950
A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23.
[ "cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_messaging_server:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-rfh6-mg6h-h668
xwiki-platform-administration-ui vulnerable to privilege escalation
ImpactAny user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default.Reproduction steps are described in https://jira.xwiki.org/browse/XWIKI-20261PatchesThe vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.WorkaroundsThe issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/f1e310826a19acdcdecdecdcfe171d21f24d6ede) on `XWiki.AdminFieldsDisplaySheet`.For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
[]
null
9.9
null
null
CVE-2025-4248
SourceCodester Simple To-Do List System complete_task.php sql injection
A vulnerability has been found in SourceCodester Simple To-Do List System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /complete_task.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2019-19297
A vulnerability has been identified in SiNVR/SiVMS Video Server (All versions < V5.0.0). The streaming service (default port 5410/tcp) of the SiVMS/SiNVR Video Server contains a path traversal vulnerability, that could allow an unauthenticated remote attacker to access and download arbitrary files from the server.
[ "cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2015-7073
Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SSL handshake.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-45cf-5rxq-xpqr
IBM Intelligent Operations Center V5.1.0 - V5.2.0, IBM Intelligent Operations Center for Emergency Management V5.1.0 - V5.1.0.6, and IBM Water Operations for Waternamics V5.1.0 - V5.2.1.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 161201.
[]
null
7.5
null
null
GHSA-6mqh-rwpp-6xcj
A vulnerability has been identified in Mendix Workflow Commons (All versions < V2.4.0). Affected versions of the module improperly handle access control for some module entities. This could allow authenticated remote attackers to read or delete sensitive information.
[]
null
8.1
null
null
CVE-2017-15268
Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-x2hh-j2qq-439g
Cross-site scripting (XSS) vulnerability in index.php in JBook 1.3 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
[]
null
null
null
null
GHSA-796g-c5p5-hfrr
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges
[]
null
9.8
null
null
CVE-2021-35573
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*" ]
null
7.5
null
null