id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-w7c2-4jxv-7chp
|
A path traversal vulnerability was reported in the Motorola Ready For application that could allow a local attacker to access local files.
|
[] | null | 2.8 | null | null | null |
|
GHSA-jchw-25xp-jwwc
|
Follow Redirects improperly handles URLs in the url.parse() function
|
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
|
[] | null | 6.1 | null | null | null |
CVE-2010-3831
|
Photos in Apple iOS before 4.2 enables support for HTTP Basic Authentication over an unencrypted connection, which allows man-in-the-middle attackers to read MobileMe account passwords by spoofing a MobileMe Gallery server during a "Send to MobileMe" action.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-hx3p-mvcq-8g8m
|
Microsoft MSN Messenger 4.7 on Windows XP allows remote attackers to cause a denial of service (resource consumption) via a flood of SIP INVITE requests to the port specified for voice conversation.
|
[] | null | null | null | null | null |
|
GHSA-cj7x-pmqr-fc9p
|
ZF2014-03 has a potential cross site scripting vector in multiple view helpers
|
[] | null | 6.1 | null | null | null |
|
GHSA-hm6h-3c43-g4fj
|
Use-after-free vulnerability in QuickTime in Apple Mac OS X 10.7.x before 10.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with JPEG2000 encoding.
|
[] | null | null | null | null | null |
|
CVE-2005-1883
|
global.php in YaPiG 0.92b allows remote attackers to include arbitrary local files via the BASE_DIR parameter.
|
[
"cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-f784-rmxc-rc67
|
The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder, Slider, Gallery, Form, Modal, Data Table Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `Sina Posts`, `Sina Blog Post` and `Sina Table` widgets in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2021-41063
|
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.
|
[
"cpe:2.3:a:xylem:aanderaa_geoview:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2023-26572
|
Unauthenticated SQL Injection In IDAttend’s IDWeb Application
|
Unauthenticated SQL injection in the GetExcursionList method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.
|
[
"cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-fxw5-mp3x-jpj6
|
Multiple PHP remote file inclusion vulnerabilities in PHPauction GPL 2.51 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) converter.inc.php, (2) messages.inc.php, and (3) settings.inc.php in includes/.
|
[] | null | null | null | null | null |
|
GHSA-jx9f-pj44-f5rh
|
In the module “Customization fields fee for your store” (aicustomfee) from ai-dev module for PrestaShop, an attacker can perform SQL injection up to 0.2.0. Release 0.2.1 fixed this security issue.
|
[] | null | 9.8 | null | null | null |
|
GHSA-xvrg-83h8-x5v4
|
Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack.
|
[] | null | null | null | null | null |
|
GHSA-9cmg-www5-3gxx
|
Buffer overflow on the Linksys WRT54GL wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
|
[] | null | null | null | null | null |
|
CVE-2021-0318
|
In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2019-12530
|
Incorrect access control was discovered in the stdonato Dashboard plugin through 0.9.7 for GLPI, affecting df.php, issue.php, load.php, mem.php, traf.php, and uptime.php in front/sh.
|
[
"cpe:2.3:a:glpi_dashboard_project:glpi_dashboard:*:*:*:*:*:glpi:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2025-2908
|
Insufficiently Protected Credentials vulnerability in MeetMe products
|
The exposure of credentials in the call forwarding configuration module in MeetMe products in versions prior to 2024-09 allows an attacker to gain access to some important assets via configuration files.
|
[] | 8.5 | null | null | null | null |
GHSA-j4j9-vv9c-xpp3
|
An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
|
[] | null | 4.9 | null | null | null |
|
CVE-2017-14958
|
lib.php in PivotX 2.3.11 does not properly block uploads of dangerous file types by admin users, which allows remote PHP code execution via an upload of a .php file.
|
[
"cpe:2.3:a:pivotx:pivotx:2.3.11:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
CVE-2008-3841
|
Cross-site scripting (XSS) vulnerability in admin/search_links.php in Freeway eCommerce 1.4.1.171 allows remote attackers to inject arbitrary web script or HTML via the search_link parameter.
|
[
"cpe:2.3:a:openfreeway:freeway:1.4.1.171:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-cpmg-8xfp-5wj8
|
An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel even if this traffic is not generated by the VPN client. This allows an adversary to trick the victim into sending plaintext traffic to the VPN server's IP address and thereby deanonymize the victim. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "ServerIP attack for only traffic to the real IP address of the VPN server" rather than to only Clario.
|
[] | null | 6.3 | null | null | null |
|
CVE-2025-27738
|
Windows Resilient File System (ReFS) Information Disclosure Vulnerability
|
Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.
|
[] | null | 6.5 | null | null | null |
CVE-2024-53796
|
WordPress Themesflat Addons For Elementor plugin <= 2.2.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows DOM-Based XSS.This issue affects Themesflat Addons For Elementor: from n/a through 2.2.2.
|
[] | null | 6.5 | null | null | null |
GHSA-3qhj-558h-vvvj
|
Cross-site scripting (XSS) vulnerability in NBBC before 1.4.2 allows remote attackers to inject arbitrary web script or HTML via an invalid URL in a BBCode img tag.
|
[] | null | null | null | null | null |
|
GHSA-xh53-2m5x-5pw7
|
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.
|
[] | null | null | 7.8 | null | null |
|
CVE-2002-2417
|
acFTP 1.4 does not properly handle when an invalid password is provided by the user during authentication, which allows remote attackers to hide or misrepresent certain activity from log files and possibly gain privileges.
|
[
"cpe:2.3:a:acftp:acftp:1.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-f9ww-4p5f-wmx4
|
Cross-site request forgery (CSRF) vulnerability in 1024 CMS 1.2.5 allows remote attackers to perform some actions as administrators, as demonstrated by (1) an unspecified action that creates a file containing PHP code and (2) unspecified use of the forum component. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2018-16782
|
libimageworsener.a in ImageWorsener 1.3.2 has a buffer overflow in the bmpr_read_rle_internal function in imagew-bmp.c.
|
[
"cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2007-3556
|
Liesbeth base CMS stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an include file containing account credentials via a direct request for config.inc.
|
[
"cpe:2.3:a:doubleflex:liesbeth_base_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2019:3196
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | 7.5 | null | null |
CVE-2025-24638
|
WordPress Create with Code plugin <= 1.4 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pete Dring Create with Code allows DOM-Based XSS. This issue affects Create with Code: from n/a through 1.4.
|
[] | null | 6.5 | null | null | null |
CVE-2025-8751
|
Protected Total WebShield Extension Block Page cross site scripting
|
A vulnerability was found in Protected Total WebShield Extension up to 3.2.0 on Chrome. It has been classified as problematic. This affects an unknown part of the component Block Page. The manipulation of the argument Category leads to cross site scripting. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 2.3 | 3.1 | 3.1 | 2.6 | null |
CVE-2018-1000515
|
ventrian News-Articles version NewsArticles.00.09.11 contains a XML External Entity (XXE) vulnerability in News-Articles/API/MetaWebLog/Handler.ashx.vb that can result in Attacker can read any file in the server or use smbrelay attack to access to server..
|
[
"cpe:2.3:a:news-articles_project:news-articles:00.09.11:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-p484-7m3w-w9xh
|
TOCTOU race-condition vulnerability in Insyde InsydeH2O with Kernel 5.2 before version 05.27.29, Kernel 5.3 before version 05.36.29, Kernel 5.4 version before 05.44.13, and Kernel 5.5 before version 05.52.13 allows an attacker to alter data and code used by the remainder of the boot process.
|
[] | null | 4.7 | null | null | null |
|
GHSA-vmq8-94rq-xchh
|
U&M Software JustBookIt 1.0 does not require administrative authentication for all scripts in the admin/ directory, which allows remote attackers to have an unspecified impact via a direct request to (1) user_manual.php, (2) user_config.php, (3) user_kundnamn.php, (4) user_kundlista.php, (5) user_aktiva_kunder.php, (6) database.php, and possibly (7) index.php.
|
[] | null | null | null | null | null |
|
GHSA-f775-4rjm-m64p
|
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite and Server before 6.22.0 rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allows remote authenticated users to inject arbitrary web script or HTML via a delivery=view action, aka Bug ID 26373, a different vulnerability than CVE-2013-3106.
|
[] | null | null | null | null | null |
|
CVE-2012-5624
|
The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.
|
[
"cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.6.5:rc:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.7.6:rc:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-32923
|
there is a possible cellular denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 4 | null | null | null |
|
CVE-2009-0834
|
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
GHSA-rxxh-4rjm-62rq
|
Microsoft Office Graphics Component Information Disclosure Vulnerability
|
[] | null | 6.1 | null | null | null |
|
GHSA-r5xm-9894-gpw6
|
Open edX platform before 2022-06-06 allows XSS via the "next" parameter in the logout URL.
|
[] | null | 6.1 | null | null | null |
|
GHSA-rcj3-h239-hjc8
|
An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-38770
|
WordPress Backup and Staging by WP Time Capsule plugin <= 1.22.20 - Authentication Bypass and Privilege Escalation Vulnerability
|
Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20.
|
[
"cpe:2.3:a:revmakx:backup_and_staging_by_wp_time_capsule:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-jmf3-9f5j-cpjh
|
Windows Task Scheduler Elevation of Privilege Vulnerability
|
[] | null | 8.8 | null | null | null |
|
GHSA-gv63-32vm-56hx
|
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
|
[] | null | null | null | null | null |
|
GHSA-m4qq-492w-2qw2
|
HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc.
|
[] | null | 7.4 | null | null | null |
|
GHSA-3f2f-2p2j-r4w2
|
The Buy 99 Cents Only Products (aka com.ww99CentsOnlyStores) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
RHSA-2017:2635
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 6
|
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 8.1 | null | null |
GHSA-vhx4-h49c-248m
|
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | null | null | null |
|
CVE-2013-2254
|
The deepGetOrCreateNode function in impl/operations/AbstractCreateOperation.java in org.apache.sling.servlets.post.bundle 2.2.0 and 2.3.0 in Apache Sling does not properly handle a NULL value that returned when the session does not have permissions to the root node, which allows remote attackers to cause a denial of service (infinite loop) via unspecified vectors.
|
[
"cpe:2.3:a:apache:org.apache.sling.servlets.post:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:org.apache.sling.servlets.post:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:sling:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-5989
|
Rockwell Automation ThinManager® ThinServer™ Improper Input Validation Vulnerability
|
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.
|
[
"cpe:2.3:a:rockwellautomation:thinmanager:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:13.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*"
] | 9.3 | null | null | null | null |
CVE-2018-19887
|
An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 4 case.
|
[
"cpe:2.3:a:audiocoding:freeware_advanced_audio_coder:1.29.9.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2022-3332
|
SourceCodester Food Ordering Management System POST Parameter router.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System. This affects an unknown part of the file router.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-209583.
|
[
"cpe:2.3:a:food_ordering_management_system_project:food_ordering_management_system:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-5wg4-7x93-v266
|
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
|
[] | null | 5 | null | null | null |
|
CVE-2017-8858
|
In Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier, there is unauthenticated privileged remote file write using the 'bprd' process.
|
[
"cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
RHSA-2020:5305
|
Red Hat Security Advisory: rh-nodejs12-nodejs security update
|
nodejs-yargs-parser: prototype pollution vulnerability nodejs-y18n: prototype pollution vulnerability c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.6 | null | null | null |
GHSA-pfm4-qwvx-8qmj
|
An issue was discovered on Samsung mobile devices with O(8.x) software. There is a Notification leak on a locked device in Standalone Dex mode. The Samsung ID is SVE-2018-12925 (November 2018).
|
[] | null | null | null | null | null |
|
GHSA-m72x-m7hc-6vp7
|
On the EPSON WF-2750 printer with firmware JP02I2, the Web interface AirPrint Setup page is vulnerable to HTML Injection that can redirect users to malicious sites.
|
[] | null | null | 6.1 | null | null |
|
CVE-2024-25524
|
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx.
|
[
"cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*"
] | null | 9.4 | null | null | null |
|
CVE-2023-50989
|
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the pingSet function.
|
[
"cpe:2.3:o:tenda:i29_firmware:1.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:i29_firmware:1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:i29:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-v5q8-xvg8-g43w
|
Online Shopping Portal Project v3.1 was discovered to contain a SQL injection vulnerability via the Email parameter at /shopping/login.php.
|
[] | null | 8.8 | null | null | null |
|
GHSA-p5mw-x2jr-q9g7
|
An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.
|
[] | null | null | 8.8 | null | null |
|
GHSA-wmm4-77g9-76jv
|
An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
|
[] | null | null | 7.5 | null | null |
|
GHSA-96gq-m97m-9ppg
|
In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.
|
[] | null | null | 8.1 | null | null |
|
CVE-2009-3339
|
Unspecified vulnerability in McAfee Email and Web Security Appliance 5.1 VMtrial allows remote attackers to read arbitrary files via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
|
[
"cpe:2.3:a:mcafee:email_and_web_security_appliance:5.1:-:vmtrial:*:*:*:*:*",
"cpe:2.3:h:mcafee:email_and_web_security_appliance:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-qvrc-hgq4-x7gw
|
Microsoft Internet Explorer 6.0.2900.2180 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312.
|
[] | null | null | null | null | null |
|
CVE-2023-38433
|
Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.
|
[
"cpe:2.3:h:fujitsu:ip-he950e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he950d_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he900e_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he900d_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900e_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-920e_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900d_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900iid_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-920d_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-90:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-9610_firmware:v01l001:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he950e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he950d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-he950d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he900e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-he900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-he900d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-he900d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-920e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-920e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-900d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-900iid_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-900iid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-920d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-920d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-90_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-90:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:ip-9610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:ip-9610:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-r64c-j6jf-m9jx
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-p22p-6prx-hph4
|
Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow vulnerability in the function formSetAdConfigInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the authIPs parameter.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-8782
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2025-20922
|
Out-of-bounds read in appending text paragraph in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
|
[] | null | 5.5 | null | null | null |
|
CVE-2022-21345
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2023-38242
|
ZDI-CAN-21387: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2025-3857
|
Infinite loop condition in Amazon.IonDotnet
|
When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2016-9495
|
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials
|
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices.
|
[
"cpe:2.3:o:hughes:hn7740s_firmware:6.9.0.34:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes:hn7740s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hughes:dw7000_firmware:6.9.0.34:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes:dw7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hughes:hn7000s_firmware:6.9.0.34:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes:hn7000s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hughes:hn7000sm_firmware:6.9.0.34:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes:hn7000sm:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 | null |
CVE-2019-2393
|
Crash while joining collections with $lookup
|
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13 and MongoDB Server v3.6 versions prior to 3.6.15.
|
[
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-43988
|
An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
[
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
RHSA-2018:3528
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 7 security update
|
JBoss/WildFly: iiop does not honour strict transport confidentiality
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 5.3 | null | null |
CVE-2024-39686
|
fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function
|
Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the bert_gen function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier.
|
[
"cpe:2.3:a:fishaudio:bert-vits2:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
RHSA-2023:1588
|
Red Hat Security Advisory: kernel security update
|
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null | null |
GHSA-3xp2-vcr5-r48r
|
viewreport.pl in NetIQ WebTrends Reporting Center Enterprise Edition 6.1a allows remote attackers to determine the installation path via an invalid profileid parameter, which leaks the pathname in an error message.
|
[] | null | null | null | null | null |
|
CVE-2022-39344
|
Azure RTOS USBX vulnerable to buffer overflow
|
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
|
[
"cpe:2.3:a:microsoft:azure_rtos_usbx:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2014-2435
|
Unspecified vulnerability in Oracle MySQL Server 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-g28r-954m-qc24
|
Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-16172
|
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
|
[
"cpe:2.3:a:section2.madisonjbrooks12_project:section2.madisonjbrooks12:0.1.1:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2018-13134
|
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.
|
[
"cpe:2.3:o:tp-link:archer_c1200_firmware:1.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_c1200:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-5fgm-r8gc-2w6h
|
In the Linux kernel, the following vulnerability has been resolved:workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM workerAfter commit
746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
amdgpu started seeing the following warning:[ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu]
...
[ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched]
...
[ ] Call Trace:
[ ] <TASK>
...
[ ] ? check_flush_dependency+0xf5/0x110
...
[ ] cancel_delayed_work_sync+0x6e/0x80
[ ] amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu]
[ ] amdgpu_ring_alloc+0x40/0x50 [amdgpu]
[ ] amdgpu_ib_schedule+0xf4/0x810 [amdgpu]
[ ] ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched]
[ ] amdgpu_job_run+0xaa/0x1f0 [amdgpu]
[ ] drm_sched_run_job_work+0x257/0x430 [gpu_sched]
[ ] process_one_work+0x217/0x720
...
[ ] </TASK>The intent of the verifcation done in check_flush_depedency is to ensure
forward progress during memory reclaim, by flagging cases when either a
memory reclaim process, or a memory reclaim work item is flushed from a
context not marked as memory reclaim safe.This is correct when flushing, but when called from the
cancel(_delayed)_work_sync() paths it is a false positive because work is
either already running, or will not be running at all. Therefore
cancelling it is safe and we can relax the warning criteria by letting the
helper know of the calling context.References: 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
|
[] | null | null | null | null | null |
|
GHSA-gx34-gwqq-m8fg
|
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] | null | null | null | null | null |
|
GHSA-h6j8-h5j9-864g
|
RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored.
|
[] | null | null | null | null | null |
|
CVE-2022-31463
|
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.
|
[
"cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-pv94-6hw8-hh77
|
Missing Authorization vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Simple HTML Sitemap: from n/a through 2.7.
|
[] | null | 5.3 | null | null | null |
|
CVE-2019-6195
|
An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out. The authorization bypass does not exist when “Local Authentication and Authorization” or “LDAP Authentication and Authorization” modes are configured and used by XCC.
|
[
"cpe:2.3:a:lenovo:xclarity_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650_dwc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx_sr650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st558:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr950_server:-:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
|
RHSA-2024:0695
|
Red Hat Security Advisory: Logging 5.6.16 - Red Hat OpenShift
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
|
[
"cpe:/a:redhat:logging:5.6::el8"
] | null | 5.3 | null | null | null |
GHSA-v3h6-v65m-hwf7
|
An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5.
|
[] | null | null | null | null | null |
|
CVE-2023-42691
|
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
RHSA-2022:7066
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null | null |
CVE-2024-37554
|
WordPress UltraAddons plugin <= 1.1.6 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode).This issue affects UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): from n/a through 1.1.6.
|
[
"cpe:2.3:a:codeastrology:ultraaddons:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-m297-2wvr-723p
|
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
|
[] | 7.3 | 7.8 | null | null | null |
|
RHSA-2023:0786
|
Red Hat Security Advisory: Network observability 1.1.0 security update
|
network-observability-console-plugin-container: setting Loki authToken configuration to DISABLE or HOST mode leads to authentication longer being enforced
|
[
"cpe:/a:redhat:network_observ_optr:1.1.0::el8"
] | null | 7.5 | null | null | null |
CVE-2023-40788
|
SpringBlade <=V3.6.0 is vulnerable to Incorrect Access Control due to incorrect configuration in the default gateway resulting in unauthorized access to error logs
|
[
"cpe:2.3:a:bladex:springblade:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.