id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-2xwh-g8m2-c95g | Unspecified vulnerability in the Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality, integrity, and availability, related to SYS.DMP_SYS. | [] | null | null | null | null |
|
GHSA-86w3-hm4v-hj7x | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33780, CVE-2021-34494, CVE-2021-34525. | [] | null | 8 | null | null |
|
CVE-2018-4027 | An exploitable denial-of-service vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a semaphore deadlock, which prevents the device from receiving any physical or network inputs. An attacker can send a specially crafted packet to trigger this vulnerability. | [
"cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:1.9:*:*:*:*:*:*:*",
"cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-cpj9-hvqw-3m28 | A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904. | [] | null | 7.3 | null | null |
|
CVE-2022-2766 | SourceCodester Loan Management System index.php sql injection | A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-206162 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:razormist:loan_management_system:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2016-5002 | XML external entity (XXE) vulnerability in the Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted DTD. | [
"cpe:2.3:a:apache:xml-rpc:3.1.3:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-1999-0550 | A router's routing tables can be obtained from arbitrary hosts. | [] | null | null | null | 7.5 |
|
GHSA-8r4r-8c3p-6r95 | In the Linux kernel, the following vulnerability has been resolved:tracing/timerlat: Fix a race during cpuhp processingThere is another found exception that the "timerlat/1" thread was
scheduled on CPU0, and lead to timer corruption finally:After tracing the scheduling event, it was discovered that the migration
of the "timerlat/1" thread was performed during thread creation. Further
analysis confirmed that it is because the CPU online processing for
osnoise is implemented through workers, which is asynchronous with the
offline processing. When the worker was scheduled to create a thread, the
CPU may has already been removed from the cpu_online_mask during the offline
process, resulting in the inability to select the right CPU:T1 | T2
[CPUHP_ONLINE] | cpu_device_down()
osnoise_hotplug_workfn() |
| cpus_write_lock()
| takedown_cpu(1)
| cpus_write_unlock()
[CPUHP_OFFLINE] |
cpus_read_lock() |
start_kthread(1) |
cpus_read_unlock() |To fix this, skip online processing if the CPU is already offline. | [] | null | 4.7 | null | null |
|
GHSA-3422-45qx-4m3x | Race condition in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (NULL pointer free and module crash) by triggering intermittent connectivity with many IPv6 CPE devices, aka Bug ID CSCug47366. | [] | null | null | null | null |
|
CVE-2020-26137 | urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116. | [
"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
GHSA-5crm-rrf8-p8c4 | Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project files, which makes it easier for local users to obtain sensitive information by leveraging access to a file and conducting a brute-force attack. | [] | null | null | 4.7 | null |
|
CVE-2021-2281 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-cph5-m8f7-6c5x | axios Inefficient Regular Expression Complexity vulnerability | axios before v0.21.2 is vulnerable to Inefficient Regular Expression Complexity. | [] | null | 7.5 | null | null |
GHSA-vr7r-prw9-wjpq | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <= 2.2.0 versions. | [] | null | 7.1 | null | null |
|
GHSA-9fqw-wrjv-hpjm | The mintToken function of a smart contract implementation for GFCB, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | 7.5 | null | null |
|
CVE-2024-31387 | WordPress Popup Likebox plugin <= 3.7.2 - Cross-Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup LikeBox Team Popup Like box allows Stored XSS.This issue affects Popup Like box: from n/a through 3.7.2.
| [] | null | 5.9 | null | null |
CVE-2018-1069 | Red Hat OpenShift Enterprise version 3.7 is vulnerable to access control override for container network filesystems. An attacker could override the UserId and GroupId for GlusterFS and NFS to read and write any data on the network filesystem. | [
"cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*"
] | null | null | 7.1 | 5.4 |
|
CVE-2023-6067 | WP User Profile Avatar <= 1.0.1 - Contributor+ Stored XSS | The WP User Profile Avatar WordPress plugin through 1.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:wp-eventmanager:user_profile_avatar:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-4pr5-h4qv-336x | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. | [] | null | 7.8 | null | null |
|
GHSA-hm88-xqxr-4jwr | There is an unauthorized access vulnerability in ZTE H388X. If H388X is caused by brute-force serial port cracking,attackers with common user permissions can use this vulnerability to obtain elevated permissions on the affected device by performing specific operations. | [] | null | 7.1 | null | null |
|
CVE-2021-33036 | Apache Hadoop Privilege escalation vulnerability | In Apache Hadoop 2.2.0 to 2.10.1, 3.0.0-alpha1 to 3.1.4, 3.2.0 to 3.2.2, and 3.3.0 to 3.3.1, a user who can escalate to yarn user can possibly run arbitrary commands as root user. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher. | [
"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:3.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:3.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:3.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:3.0.0:alpha4:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
CVE-2022-34031 | Nginx NJS v0.7.5 was discovered to contain a segmentation violation via njs_value_to_number at src/njs_value_conversion.h. | [
"cpe:2.3:a:f5:njs:0.7.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2024:2512 | Red Hat Security Advisory: file security update | file: stack-based buffer over-read in file_copystr in funcs.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
CVE-2023-33299 | A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed. | [
"cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac:9.4.2:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
CVE-2024-33625 | CyberPower PowerPanel business Use of Hard-coded Password | CyberPower PowerPanel business
application code contains a hard-coded JWT signing key. This could
result in an attacker forging JWT tokens to bypass authentication. | [
"cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2013-3451 | Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Unified Communications Manager (Unified CM) allow remote attackers to hijack the authentication of arbitrary users for requests that perform arbitrary Unified CM operations, aka Bug ID CSCui13033. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2014-3947 | Unrestricted file upload vulnerability in the powermail extension before 1.6.11 and 2.x before 2.0.14 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with a crafted extension, then accessing it via unspecified vectors. | [
"cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.4:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.5:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.6:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.7:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.8:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.9:*:*:*:*:typo3:*:*",
"cpe:2.3:a:alex_kellner:powermail:2.0.10:*:*:*:*:typo3:*:*"
] | null | null | null | 7.5 |
|
GHSA-mq2g-g8r2-m98v | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8. | [] | null | 7.1 | null | null |
|
CVE-2021-34364 | The Refined GitHub browser extension before 21.6.8 might allow XSS via a link in a document. NOTE: github.com sends Content-Security-Policy headers to, in general, address XSS and other concerns. | [
"cpe:2.3:a:refined-github_project:refined-github:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-3rg2-g53j-xh7w | Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script. | [] | null | null | null | null |
|
CVE-2021-20361 | IBM Cloud Pak for Applications 4.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195032. | [
"cpe:2.3:a:ibm:cloud_pak_for_applications:4.3:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-2r4h-m59f-x4w8 | In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A | [] | null | null | null | null |
|
CVE-2007-1785 | The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2017-18239 | A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests. | [
"cpe:2.3:a:authentikat-jwt_project:authentikat-jwt:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-cvxv-m3wh-fqjf | The “JetWidgets For Elementor� WordPress Plugin before 1.0.9 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. | [] | null | null | null | null |
|
GHSA-j4rf-24v6-vq7x | A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users. | [] | null | 5.5 | null | null |
|
CVE-2018-10252 | An issue was discovered on Actiontec WCB6200Q before 1.1.10.20a devices. The admin login session cookie is insecurely generated making admin session hijacking possible. When an admin logs in, a session cookie is generated using the time of day rounded to 10ms. Since the web server returns its current time of day in responses, it is possible to step backward through possible session values until a working one is found. Once a working session ID is found, an attacker then has admin control of the device and can add a secondary SSID to create a backdoor to the network. | [
"cpe:2.3:o:actiontec:wcb6200q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:actiontec:wcb6200q:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2023-7140 | code-projects Client Details System manage-users.php sql injection | A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143. | [
"cpe:2.3:a:code-projects:client_details_system:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 4.7 |
CVE-2007-0806 | Les News 2.2 allows remote attackers to bypass authentication and gain administrative access via a direct request for adminews/index_fr.php3, and possibly the adminews index documents for other localizations. | [
"cpe:2.3:a:les_news:les_news:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-2522 | Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2013 SP1 allows remote authenticated users to inject arbitrary web script or HTML via crafted content, aka "Microsoft SharePoint XSS Spoofing Vulnerability." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-465r-3gh8-mpg4 | Cross-Site Request Forgery (CSRF) vulnerability in jordan.hatch Infusionsoft Analytics allows Cross Site Request Forgery. This issue affects Infusionsoft Analytics: from n/a through 2.0. | [] | null | 5.4 | null | null |
|
GHSA-6wj9-53h7-6h32 | Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors. | [] | null | null | 9.8 | null |
|
CVE-2000-1036 | Directory traversal vulnerability in Extent RBS ISP web server allows remote attackers to read sensitive information via a .. (dot dot) attack on the Image parameter. | [
"cpe:2.3:a:extent_technologies:rbs_isp:2.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-39262 | Stored Cross-Site Scripting (XSS) on login page in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 5.2 | null | null |
GHSA-m5f7-xx8h-v9x2 | geo-code in gpsdrive-scripts 2.10~pre4 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/geo.google, (2) /tmp/geo.yahoo, (3) /tmp/geo.coords, and (4) /tmp/geo#####.coords temporary files. | [] | null | null | null | null |
|
CVE-2017-1308 | IBM Daeja ViewONE Professional, Standard & Virtual 4.1.5.1 and 5.0 could allow an authenticated attacker to download files they should not have access to due to improper access controls. IBM X-Force ID: 125462. | [
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:virtual:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:virtual:*:*:*",
"cpe:2.3:a:ibm:daeja_viewone:5.0:*:*:*:virtual:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-r2j7-cpgf-7qq3 | A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file. | [] | null | null | null | null |
|
GHSA-9gjc-h498-ff34 | An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | 7.8 | null | null |
|
GHSA-gvjq-83mf-jj97 | The bookmarkify plugin 2.9.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=bookmarkify.php. | [] | null | 6.5 | null | null |
|
CVE-2016-8352 | An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code. | [
"cpe:2.3:o:schneider-electric:connexium_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tcsefec23f3f20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tcsefec23f3f21:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tcsefec23fcf20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tcsefec23fcf21:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tcsefec2cf3f20:-:*:*:*:*:*:*:*"
] | null | null | 10 | 7.5 |
|
GHSA-fx3w-hj7j-hfgf | VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed. | [] | null | 7.8 | null | null |
|
GHSA-jhcv-c76w-jfvj | The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [] | null | null | null | null |
|
GHSA-h9p4-9jqg-j34h | The use of the deprecated API `process.binding()` can bypass the permission model through path traversal.This vulnerability affects all users using the experimental permission model in Node.js 20.x.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | [] | null | 7.5 | null | null |
|
CVE-2020-25614 | xmlquery before 1.3.1 lacks a check for whether a LoadURL response is in the XML format, which allows attackers to cause a denial of service (SIGSEGV) at xmlquery.(*Node).InnerText or possibly have unspecified other impact. | [
"cpe:2.3:a:xmlquery_project:xmlquery:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-32320 | A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file. | [
"cpe:2.3:a:ferdium:ferdium:6.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly1:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly10:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly11:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly12:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly13:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly14:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly15:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly16:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly17:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly18:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly19:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly2:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly20:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly21:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly22:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly23:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly24:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly25:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly26:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly27:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly28:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly29:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly3:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly30:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly31:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly32:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly33:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly34:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly35:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly36:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly37:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly38:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly39:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly4:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly40:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly41:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly42:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly43:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly44:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly45:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly46:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly47:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly48:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly49:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly5:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly50:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly51:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly52:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly53:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly54:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly55:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly56:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly57:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly58:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly59:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly6:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly60:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly61:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly62:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly63:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly65:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly66:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly67:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly69:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly7:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly70:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly71:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly72:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly73:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly74:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly76:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly77:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly78:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly79:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly8:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly80:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly81:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly82:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly83:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly84:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly85:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly86:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly87:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly88:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly89:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly9:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly90:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly91:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly92:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly93:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly94:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly95:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly96:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly97:*:*:*:*:*:*",
"cpe:2.3:a:ferdium:ferdium:6.0.0:nightly98:*:*:*:*:*:*",
"cpe:2.3:a:getferdi:ferdi:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2016-9596 | libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627. | [
"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2018-11598 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c. | [
"cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.8 |
|
RHSA-2009:1588 | Red Hat Security Advisory: kernel security update | kernel: fs: pipe.c null pointer dereference | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
CVE-2008-4877 | SQL injection vulnerability in admin.php in WebCards 1.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:mywebcards:webcards:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-3951 | RLE Nova-Wind Turbine HMI devices store cleartext credentials, which allows remote attackers to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:o:rle:nova-wind_turbine_hmi_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rle:nova-wind_turbine_hmi:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-q69w-42hm-p3qq | Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. | [] | null | null | null | null |
|
GHSA-qgrr-f26j-87vf | An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript. | [] | null | null | null | null |
|
CVE-2012-5102 | Cross-site scripting (XSS) vulnerability in inc/extensions.php in VertrigoServ 2.25 allows remote attackers to inject arbitrary web script or HTML via the ext parameter. | [
"cpe:2.3:a:dariusz_handzlik:vertrigoserv:2.25:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-g2f6-v5qh-h2mq | Nexus Repository Manager 3 - Remote Code Execution | Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2). | [] | null | 8.8 | null | null |
GHSA-8gh9-2qqw-fwfv | A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later | [] | null | null | null | null |
|
GHSA-5cqv-55pw-mrcp | pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText. | [] | null | null | null | null |
|
CVE-2022-42160 | D-Link COVR 1200,1202,1203 v1.08 was discovered to contain a command injection vulnerability via the system_time_timezone parameter at function SetNTPServerSettings. | [
"cpe:2.3:o:dlink:covr_1203_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1202_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1200_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1200:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-862p-2jpg-8gg4 | LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution. | [] | null | null | 8.1 | null |
|
CVE-2014-6346 | Microsoft Internet Explorer 8 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-21829 | A heap-based buffer overflow vulnerability exists in the XML Decompression EnumerationUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
CVE-2008-5106 | Buffer overflow in KarjaSoft Sami FTP Server 2.0.x allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long argument to an arbitrary command, which triggers the overflow when the SamyFtp.binlog log file is viewed in the management console. NOTE: this may overlap CVE-2006-0441 and CVE-2006-2212. | [
"cpe:2.3:a:karjasoft:sami_ftp_server:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:karjasoft:sami_ftp_server:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2017-6257 | NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where a NULL pointer dereference may lead to denial of service or potential escalation of privileges | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 7.2 |
|
GHSA-fx3v-8fpc-vc6w | SQL injection vulnerability in SourceCodester E-Commerce Website V 1.0 allows remote attackers to execute arbitrary SQL statements, via the update parameter to empViewUpdate.php . | [] | null | null | null | null |
|
CVE-2016-1995 | HPE System Management Homepage before 7.5.4 allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2009-0582 | The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data. | [
"cpe:2.3:a:gnome:evolution-data-server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution-data-server:2.25.92:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-vmmw-r7wc-96jr | Multiple SQL injection vulnerabilities in Buddy Zone 1.5 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the news_id parameter to view_news.php, (2) the cat_id parameter to view_events.php, or (3) the member_id parameter to video_gallery.php. | [] | null | null | null | null |
|
GHSA-58pg-75f2-3jxj | Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE). | [] | null | null | null | null |
|
CVE-2020-22030 | A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/af_afade.c in crossfade_samples_fltp, which might lead to memory corruption and other potential consequences. | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-gfwj-v75f-c948 | StarWind SAN and NAS before 0.2 build 1685 allows users to reset other users' passwords. | [] | null | 8.8 | null | null |
|
CVE-2022-45756 | SENS v1.0 is vulnerable to Cross Site Scripting (XSS). | [
"cpe:2.3:a:sens_project:sens:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2024-28236 | Insecure Variable Substitution in Vela | Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and — by using common substitution string manipulation — can bypass log masking and expose secrets without the use of the commands block. This unexpected behavior primarily impacts secrets restricted by the "no commands" option. This can lead to unintended use of the secret value, and increased risk of exposing the secret during image execution bypassing log masking. **To exploit this** the pipeline author must be supplying the secrets to a plugin that is designed in such a way that will print those parameters in logs. Plugin parameters are not designed for sensitive values and are often intentionally printed throughout execution for informational/debugging purposes. Parameters should therefore be treated as insensitive. While Vela provides secrets masking, secrets exposure is not entirely solved by the masking process. A docker image (plugin) can easily expose secrets if they are not handled properly, or altered in some way. There is a responsibility on the end-user to understand how values injected into a plugin are used. This is a risk that exists for many CICD systems (like GitHub Actions) that handle sensitive runtime variables. Rather, the greater risk is that users who restrict a secret to the "no commands" option and use image restriction can still have their secret value exposed via substitution tinkering, which turns the image and command restrictions into a false sense of security. This issue has been addressed in version 0.23.2. Users are advised to upgrade. Users unable to upgrade should not provide sensitive values to plugins that can potentially expose them, especially in `parameters` that are not intended to be used for sensitive values, ensure plugins (especially those that utilize shared secrets) follow best practices to avoid logging parameters that are expected to be sensitive, minimize secrets with `pull_request` events enabled, as this allows users to change pipeline configurations and pull in secrets to steps not typically part of the CI process, make use of the build approval setting, restricting builds from untrusted users, and limit use of shared secrets, as they are less restrictive to access by nature. | [] | null | 7.7 | null | null |
CVE-2021-20722 | Untrusted search path vulnerability in the installers of ScanSnap Manager prior to versions V7.0L20 and the Software Download Installer prior to WinSSInst2JP.exe and WinSSInst2iX1500JP.exe allows an attacker to gain privileges and execute arbitrary code with the privilege of the user invoking the installer via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:fujitsu:scansnap_manager:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-8hm6-grmp-33x9 | Cross-site scripting (XSS) vulnerability in Samsung SHR-5162, SHR-5082, and possibly other models, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] | null | null | null | null |
|
CVE-2018-14663 | An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the 'useClientSubnet' or the experimental 'addXPF' parameters are used when declaring a new backend. | [
"cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
GHSA-w6q2-48ch-fj26 | Allegro Tech BigFlow vulnerable to Missing SSL Certificate Validation | Allegro Tech BigFlow prior to 1.6.0 is vulnerable to Missing SSL Certificate Validation. | [] | null | 5.9 | null | null |
RHSA-2022:1589 | Red Hat Security Advisory: kernel security update | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.1 | null | null |
GHSA-grgm-fh8q-rhmf | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of a XFA object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6523. | [] | null | null | 8.8 | null |
|
CVE-2017-9839 | Dolibarr ERP/CRM is affected by SQL injection in versions before 5.0.4 via product/stats/card.php (type parameter). | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-cm2w-6f5f-6c2h | Frog CMS 0.9.5 allows PHP code execution via <?php to the admin/?/layout/edit/1 URI. | [] | null | null | 7.2 | null |
|
CVE-2023-6733 | The WP-Members Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.8 via the wpmem_field shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including user emails, password hashes, usernames, and more. | [
"cpe:2.3:a:butlerblog:wp-members:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
|
CVE-2017-7398 | D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password. | [
"cpe:2.3:o:d-link:dir-615_firmware:20.09:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-q7v5-6947-34gx | An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843. | [] | null | null | null | null |
|
RHSA-2024:2973 | Red Hat Security Advisory: libX11 security update | libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
GHSA-6phf-73q6-gh87 | Insecure Deserialization in Apache Commons Beanutils | In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. | [] | null | 7.3 | null | null |
CVE-2017-11461 | NetApp OnCommand Unified Manager for 7-mode (core package) versions prior to 5.2.1 are susceptible to a clickjacking or "UI redress attack" which could be used to cause a user to perform an unintended action in the user interface. | [
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
GHSA-2jcg-ch57-hfxf | install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code. | [] | null | null | null | null |
|
ICSA-18-137-04 | Delta Electronics Delta Industrial Automation TPEditor (Update A) | Parsing a malformed program file may cause heap-based buffer overflow vulnerability, which may allow remote code execution.CVE-2018-8871 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] | null | null | 7.3 | null |
GHSA-25v7-q3wp-pg2v | Cross-Site Request Forgery (CSRF) vulnerability in Andrei Ivasiuc Fontific | Google Fonts allows Stored XSS.This issue affects Fontific | Google Fonts: from n/a through 0.1.6. | [] | null | 7.1 | null | null |
|
CVE-2023-23993 | WordPress IP Blocker Lite Plugin <= 11.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in LionScripts.Com LionScripts: IP Blocker Lite plugin <= 11.1.1 versions. | [
"cpe:2.3:a:lionscripts:ip_blocker_lite:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
RHSA-2024:0539 | Red Hat Security Advisory: tomcat security update | tomcat: HTTP request smuggling via malformed trailer headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
Subsets and Splits