id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-2xwh-g8m2-c95g
Unspecified vulnerability in the Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality, integrity, and availability, related to SYS.DMP_SYS.
[]
null
null
null
null
GHSA-86w3-hm4v-hj7x
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33780, CVE-2021-34494, CVE-2021-34525.
[]
null
8
null
null
CVE-2018-4027
An exploitable denial-of-service vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a semaphore deadlock, which prevents the device from receiving any physical or network inputs. An attacker can send a specially crafted packet to trigger this vulnerability.
[ "cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:1.9:*:*:*:*:*:*:*", "cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-cpj9-hvqw-3m28
A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904.
[]
null
7.3
null
null
CVE-2022-2766
SourceCodester Loan Management System index.php sql injection
A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-206162 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:razormist:loan_management_system:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2016-5002
XML external entity (XXE) vulnerability in the Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted DTD.
[ "cpe:2.3:a:apache:xml-rpc:3.1.3:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-1999-0550
A router's routing tables can be obtained from arbitrary hosts.
[]
null
null
null
7.5
GHSA-8r4r-8c3p-6r95
In the Linux kernel, the following vulnerability has been resolved:tracing/timerlat: Fix a race during cpuhp processingThere is another found exception that the "timerlat/1" thread was scheduled on CPU0, and lead to timer corruption finally:After tracing the scheduling event, it was discovered that the migration of the "timerlat/1" thread was performed during thread creation. Further analysis confirmed that it is because the CPU online processing for osnoise is implemented through workers, which is asynchronous with the offline processing. When the worker was scheduled to create a thread, the CPU may has already been removed from the cpu_online_mask during the offline process, resulting in the inability to select the right CPU:T1 | T2 [CPUHP_ONLINE] | cpu_device_down() osnoise_hotplug_workfn() | | cpus_write_lock() | takedown_cpu(1) | cpus_write_unlock() [CPUHP_OFFLINE] | cpus_read_lock() | start_kthread(1) | cpus_read_unlock() |To fix this, skip online processing if the CPU is already offline.
[]
null
4.7
null
null
GHSA-3422-45qx-4m3x
Race condition in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (NULL pointer free and module crash) by triggering intermittent connectivity with many IPv6 CPE devices, aka Bug ID CSCug47366.
[]
null
null
null
null
CVE-2020-26137
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
[ "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
GHSA-5crm-rrf8-p8c4
Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project files, which makes it easier for local users to obtain sensitive information by leveraging access to a file and conducting a brute-force attack.
[]
null
null
4.7
null
CVE-2021-2281
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-cph5-m8f7-6c5x
axios Inefficient Regular Expression Complexity vulnerability
axios before v0.21.2 is vulnerable to Inefficient Regular Expression Complexity.
[]
null
7.5
null
null
GHSA-vr7r-prw9-wjpq
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <= 2.2.0 versions.
[]
null
7.1
null
null
GHSA-9fqw-wrjv-hpjm
The mintToken function of a smart contract implementation for GFCB, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
7.5
null
null
CVE-2024-31387
WordPress Popup Likebox plugin <= 3.7.2 - Cross-Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup LikeBox Team Popup Like box allows Stored XSS.This issue affects Popup Like box: from n/a through 3.7.2.
[]
null
5.9
null
null
CVE-2018-1069
Red Hat OpenShift Enterprise version 3.7 is vulnerable to access control override for container network filesystems. An attacker could override the UserId and GroupId for GlusterFS and NFS to read and write any data on the network filesystem.
[ "cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*" ]
null
null
7.1
5.4
CVE-2023-6067
WP User Profile Avatar <= 1.0.1 - Contributor+ Stored XSS
The WP User Profile Avatar WordPress plugin through 1.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:wp-eventmanager:user_profile_avatar:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-4pr5-h4qv-336x
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
[]
null
7.8
null
null
GHSA-hm88-xqxr-4jwr
There is an unauthorized access vulnerability in ZTE H388X. If H388X is caused by brute-force serial port cracking,attackers with common user permissions can use this vulnerability to obtain elevated permissions on the affected device by performing specific operations.
[]
null
7.1
null
null
CVE-2021-33036
Apache Hadoop Privilege escalation vulnerability
In Apache Hadoop 2.2.0 to 2.10.1, 3.0.0-alpha1 to 3.1.4, 3.2.0 to 3.2.2, and 3.3.0 to 3.3.1, a user who can escalate to yarn user can possibly run arbitrary commands as root user. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher.
[ "cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:3.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:3.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:3.0.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:3.0.0:alpha4:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2022-34031
Nginx NJS v0.7.5 was discovered to contain a segmentation violation via njs_value_to_number at src/njs_value_conversion.h.
[ "cpe:2.3:a:f5:njs:0.7.5:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2024:2512
Red Hat Security Advisory: file security update
file: stack-based buffer over-read in file_copystr in funcs.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
CVE-2023-33299
A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.
[ "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:8.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac:9.4.2:*:*:*:*:*:*:*" ]
null
9.6
null
null
CVE-2024-33625
CyberPower PowerPanel business Use of Hard-coded Password
CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication.
[ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2013-3451
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Unified Communications Manager (Unified CM) allow remote attackers to hijack the authentication of arbitrary users for requests that perform arbitrary Unified CM operations, aka Bug ID CSCui13033.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2014-3947
Unrestricted file upload vulnerability in the powermail extension before 1.6.11 and 2.x before 2.0.14 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with a crafted extension, then accessing it via unspecified vectors.
[ "cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.0:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.1:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.2:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.3:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.4:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.5:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.6:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.7:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.8:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.9:*:*:*:*:typo3:*:*", "cpe:2.3:a:alex_kellner:powermail:2.0.10:*:*:*:*:typo3:*:*" ]
null
null
null
7.5
GHSA-mq2g-g8r2-m98v
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8.
[]
null
7.1
null
null
CVE-2021-34364
The Refined GitHub browser extension before 21.6.8 might allow XSS via a link in a document. NOTE: github.com sends Content-Security-Policy headers to, in general, address XSS and other concerns.
[ "cpe:2.3:a:refined-github_project:refined-github:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-3rg2-g53j-xh7w
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script.
[]
null
null
null
null
CVE-2021-20361
IBM Cloud Pak for Applications 4.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195032.
[ "cpe:2.3:a:ibm:cloud_pak_for_applications:4.3:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-2r4h-m59f-x4w8
In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A
[]
null
null
null
null
CVE-2007-1785
The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.
[ "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*" ]
null
null
null
7.1
CVE-2017-18239
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.
[ "cpe:2.3:a:authentikat-jwt_project:authentikat-jwt:*:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-cvxv-m3wh-fqjf
The “JetWidgets For Elementor� WordPress Plugin before 1.0.9 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
[]
null
null
null
null
GHSA-j4rf-24v6-vq7x
A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users.
[]
null
5.5
null
null
CVE-2018-10252
An issue was discovered on Actiontec WCB6200Q before 1.1.10.20a devices. The admin login session cookie is insecurely generated making admin session hijacking possible. When an admin logs in, a session cookie is generated using the time of day rounded to 10ms. Since the web server returns its current time of day in responses, it is possible to step backward through possible session values until a working one is found. Once a working session ID is found, an attacker then has admin control of the device and can add a secondary SSID to create a backdoor to the network.
[ "cpe:2.3:o:actiontec:wcb6200q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:actiontec:wcb6200q:-:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
CVE-2023-7140
code-projects Client Details System manage-users.php sql injection
A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143.
[ "cpe:2.3:a:code-projects:client_details_system:1.0:*:*:*:*:*:*:*" ]
null
4.3
4.3
4.7
CVE-2007-0806
Les News 2.2 allows remote attackers to bypass authentication and gain administrative access via a direct request for adminews/index_fr.php3, and possibly the adminews index documents for other localizations.
[ "cpe:2.3:a:les_news:les_news:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2015-2522
Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2013 SP1 allows remote authenticated users to inject arbitrary web script or HTML via crafted content, aka "Microsoft SharePoint XSS Spoofing Vulnerability."
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-465r-3gh8-mpg4
Cross-Site Request Forgery (CSRF) vulnerability in jordan.hatch Infusionsoft Analytics allows Cross Site Request Forgery. This issue affects Infusionsoft Analytics: from n/a through 2.0.
[]
null
5.4
null
null
GHSA-6wj9-53h7-6h32
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
[]
null
null
9.8
null
CVE-2000-1036
Directory traversal vulnerability in Extent RBS ISP web server allows remote attackers to read sensitive information via a .. (dot dot) attack on the Image parameter.
[ "cpe:2.3:a:extent_technologies:rbs_isp:2.5:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-39262
Stored Cross-Site Scripting (XSS) on login page in GLPI
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
5.2
null
null
GHSA-m5f7-xx8h-v9x2
geo-code in gpsdrive-scripts 2.10~pre4 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/geo.google, (2) /tmp/geo.yahoo, (3) /tmp/geo.coords, and (4) /tmp/geo#####.coords temporary files.
[]
null
null
null
null
CVE-2017-1308
IBM Daeja ViewONE Professional, Standard & Virtual 4.1.5.1 and 5.0 could allow an authenticated attacker to download files they should not have access to due to improper access controls. IBM X-Force ID: 125462.
[ "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:virtual:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:virtual:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:5.0:*:*:*:virtual:*:*:*" ]
null
null
6.5
4
GHSA-r2j7-cpgf-7qq3
A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.
[]
null
null
null
null
GHSA-9gjc-h498-ff34
An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.8
null
null
GHSA-gvjq-83mf-jj97
The bookmarkify plugin 2.9.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=bookmarkify.php.
[]
null
6.5
null
null
CVE-2016-8352
An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code.
[ "cpe:2.3:o:schneider-electric:connexium_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefec23f3f20:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefec23f3f21:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefec23fcf20:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefec23fcf21:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefec2cf3f20:-:*:*:*:*:*:*:*" ]
null
null
10
7.5
GHSA-fx3w-hj7j-hfgf
VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
[]
null
7.8
null
null
GHSA-jhcv-c76w-jfvj
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
[]
null
null
null
null
GHSA-h9p4-9jqg-j34h
The use of the deprecated API `process.binding()` can bypass the permission model through path traversal.This vulnerability affects all users using the experimental permission model in Node.js 20.x.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
[]
null
7.5
null
null
CVE-2020-25614
xmlquery before 1.3.1 lacks a check for whether a LoadURL response is in the XML format, which allows attackers to cause a denial of service (SIGSEGV) at xmlquery.(*Node).InnerText or possibly have unspecified other impact.
[ "cpe:2.3:a:xmlquery_project:xmlquery:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2022-32320
A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
[ "cpe:2.3:a:ferdium:ferdium:6.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly1:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly10:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly11:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly12:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly13:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly14:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly15:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly16:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly17:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly18:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly19:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly2:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly20:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly21:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly22:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly23:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly24:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly25:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly26:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly27:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly28:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly29:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly3:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly30:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly31:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly32:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly33:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly34:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly35:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly36:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly37:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly38:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly39:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly4:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly40:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly41:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly42:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly43:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly44:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly45:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly46:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly47:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly48:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly49:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly5:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly50:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly51:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly52:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly53:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly54:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly55:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly56:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly57:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly58:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly59:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly6:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly60:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly61:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly62:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly63:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly65:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly66:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly67:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly69:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly7:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly70:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly71:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly72:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly73:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly74:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly76:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly77:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly78:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly79:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly8:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly80:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly81:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly82:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly83:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly84:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly85:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly86:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly87:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly88:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly89:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly9:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly90:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly91:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly92:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly93:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly94:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly95:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly96:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly97:*:*:*:*:*:*", "cpe:2.3:a:ferdium:ferdium:6.0.0:nightly98:*:*:*:*:*:*", "cpe:2.3:a:getferdi:ferdi:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2016-9596
libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.
[ "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2018-11598
Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c.
[ "cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*" ]
null
null
7.1
5.8
RHSA-2009:1588
Red Hat Security Advisory: kernel security update
kernel: fs: pipe.c null pointer dereference
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
CVE-2008-4877
SQL injection vulnerability in admin.php in WebCards 1.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:mywebcards:webcards:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-3951
RLE Nova-Wind Turbine HMI devices store cleartext credentials, which allows remote attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:o:rle:nova-wind_turbine_hmi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rle:nova-wind_turbine_hmi:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-q69w-42hm-p3qq
Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
[]
null
null
null
null
GHSA-qgrr-f26j-87vf
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
[]
null
null
null
null
CVE-2012-5102
Cross-site scripting (XSS) vulnerability in inc/extensions.php in VertrigoServ 2.25 allows remote attackers to inject arbitrary web script or HTML via the ext parameter.
[ "cpe:2.3:a:dariusz_handzlik:vertrigoserv:2.25:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-g2f6-v5qh-h2mq
Nexus Repository Manager 3 - Remote Code Execution
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
[]
null
8.8
null
null
GHSA-8gh9-2qqw-fwfv
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later
[]
null
null
null
null
GHSA-5cqv-55pw-mrcp
pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText.
[]
null
null
null
null
CVE-2022-42160
D-Link COVR 1200,1202,1203 v1.08 was discovered to contain a command injection vulnerability via the system_time_timezone parameter at function SetNTPServerSettings.
[ "cpe:2.3:o:dlink:covr_1203_firmware:1.08:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr_1203:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:covr_1202_firmware:1.08:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr_1202:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:covr_1200_firmware:1.08:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr_1200:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-862p-2jpg-8gg4
LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
[]
null
null
8.1
null
CVE-2014-6346
Microsoft Internet Explorer 8 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-21829
A heap-based buffer overflow vulnerability exists in the XML Decompression EnumerationUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2008-5106
Buffer overflow in KarjaSoft Sami FTP Server 2.0.x allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long argument to an arbitrary command, which triggers the overflow when the SamyFtp.binlog log file is viewed in the management console. NOTE: this may overlap CVE-2006-0441 and CVE-2006-2212.
[ "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2017-6257
NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where a NULL pointer dereference may lead to denial of service or potential escalation of privileges
[ "cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*" ]
null
null
8.8
7.2
GHSA-fx3v-8fpc-vc6w
SQL injection vulnerability in SourceCodester E-Commerce Website V 1.0 allows remote attackers to execute arbitrary SQL statements, via the update parameter to empViewUpdate.php .
[]
null
null
null
null
CVE-2016-1995
HPE System Management Homepage before 7.5.4 allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2009-0582
The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.
[ "cpe:2.3:a:gnome:evolution-data-server:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:evolution-data-server:2.25.92:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-vmmw-r7wc-96jr
Multiple SQL injection vulnerabilities in Buddy Zone 1.5 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the news_id parameter to view_news.php, (2) the cat_id parameter to view_events.php, or (3) the member_id parameter to video_gallery.php.
[]
null
null
null
null
GHSA-58pg-75f2-3jxj
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
[]
null
null
null
null
CVE-2020-22030
A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/af_afade.c in crossfade_samples_fltp, which might lead to memory corruption and other potential consequences.
[ "cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-gfwj-v75f-c948
StarWind SAN and NAS before 0.2 build 1685 allows users to reset other users' passwords.
[]
null
8.8
null
null
CVE-2022-45756
SENS v1.0 is vulnerable to Cross Site Scripting (XSS).
[ "cpe:2.3:a:sens_project:sens:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2024-28236
Insecure Variable Substitution in Vela
Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and — by using common substitution string manipulation — can bypass log masking and expose secrets without the use of the commands block. This unexpected behavior primarily impacts secrets restricted by the "no commands" option. This can lead to unintended use of the secret value, and increased risk of exposing the secret during image execution bypassing log masking. **To exploit this** the pipeline author must be supplying the secrets to a plugin that is designed in such a way that will print those parameters in logs. Plugin parameters are not designed for sensitive values and are often intentionally printed throughout execution for informational/debugging purposes. Parameters should therefore be treated as insensitive. While Vela provides secrets masking, secrets exposure is not entirely solved by the masking process. A docker image (plugin) can easily expose secrets if they are not handled properly, or altered in some way. There is a responsibility on the end-user to understand how values injected into a plugin are used. This is a risk that exists for many CICD systems (like GitHub Actions) that handle sensitive runtime variables. Rather, the greater risk is that users who restrict a secret to the "no commands" option and use image restriction can still have their secret value exposed via substitution tinkering, which turns the image and command restrictions into a false sense of security. This issue has been addressed in version 0.23.2. Users are advised to upgrade. Users unable to upgrade should not provide sensitive values to plugins that can potentially expose them, especially in `parameters` that are not intended to be used for sensitive values, ensure plugins (especially those that utilize shared secrets) follow best practices to avoid logging parameters that are expected to be sensitive, minimize secrets with `pull_request` events enabled, as this allows users to change pipeline configurations and pull in secrets to steps not typically part of the CI process, make use of the build approval setting, restricting builds from untrusted users, and limit use of shared secrets, as they are less restrictive to access by nature.
[]
null
7.7
null
null
CVE-2021-20722
Untrusted search path vulnerability in the installers of ScanSnap Manager prior to versions V7.0L20 and the Software Download Installer prior to WinSSInst2JP.exe and WinSSInst2iX1500JP.exe allows an attacker to gain privileges and execute arbitrary code with the privilege of the user invoking the installer via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:fujitsu:scansnap_manager:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.4
GHSA-8hm6-grmp-33x9
Cross-site scripting (XSS) vulnerability in Samsung SHR-5162, SHR-5082, and possibly other models, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[]
null
null
null
null
CVE-2018-14663
An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the 'useClientSubnet' or the experimental 'addXPF' parameters are used when declaring a new backend.
[ "cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*" ]
null
null
5.9
null
GHSA-w6q2-48ch-fj26
Allegro Tech BigFlow vulnerable to Missing SSL Certificate Validation
Allegro Tech BigFlow prior to 1.6.0 is vulnerable to Missing SSL Certificate Validation.
[]
null
5.9
null
null
RHSA-2022:1589
Red Hat Security Advisory: kernel security update
kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.1
null
null
GHSA-grgm-fh8q-rhmf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of a XFA object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6523.
[]
null
null
8.8
null
CVE-2017-9839
Dolibarr ERP/CRM is affected by SQL injection in versions before 5.0.4 via product/stats/card.php (type parameter).
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-cm2w-6f5f-6c2h
Frog CMS 0.9.5 allows PHP code execution via <?php to the admin/?/layout/edit/1 URI.
[]
null
null
7.2
null
CVE-2023-6733
The WP-Members Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.8 via the wpmem_field shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including user emails, password hashes, usernames, and more.
[ "cpe:2.3:a:butlerblog:wp-members:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2017-7398
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password.
[ "cpe:2.3:o:d-link:dir-615_firmware:20.09:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-q7v5-6947-34gx
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843.
[]
null
null
null
null
RHSA-2024:2973
Red Hat Security Advisory: libX11 security update
libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
GHSA-6phf-73q6-gh87
Insecure Deserialization in Apache Commons Beanutils
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
[]
null
7.3
null
null
CVE-2017-11461
NetApp OnCommand Unified Manager for 7-mode (core package) versions prior to 5.2.1 are susceptible to a clickjacking or "UI redress attack" which could be used to cause a user to perform an unintended action in the user interface.
[ "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
GHSA-2jcg-ch57-hfxf
install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.
[]
null
null
null
null
ICSA-18-137-04
Delta Electronics Delta Industrial Automation TPEditor (Update A)
Parsing a malformed program file may cause heap-based buffer overflow vulnerability, which may allow remote code execution.CVE-2018-8871 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
7.3
null
GHSA-25v7-q3wp-pg2v
Cross-Site Request Forgery (CSRF) vulnerability in Andrei Ivasiuc Fontific | Google Fonts allows Stored XSS.This issue affects Fontific | Google Fonts: from n/a through 0.1.6.
[]
null
7.1
null
null
CVE-2023-23993
WordPress IP Blocker Lite Plugin <= 11.1.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in LionScripts.Com LionScripts: IP Blocker Lite plugin <= 11.1.1 versions.
[ "cpe:2.3:a:lionscripts:ip_blocker_lite:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
RHSA-2024:0539
Red Hat Security Advisory: tomcat security update
tomcat: HTTP request smuggling via malformed trailer headers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null