id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-72cm-h79h-7p2p | Multiple cross-site scripting (XSS) vulnerabilities in index.php in PHP Shopping Cart Selling Website Script allow remote attackers to inject arbitrary web script or HTML via the (1) txtkeywords and (2) cid parameters. | [] | null | null | null | null |
|
CVE-2016-3847 | The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28871433. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.9 |
|
CVE-2019-6535 | Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. | [
"cpe:2.3:o:mitsubishielectric:q03udvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q03udvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-633x-8x8r-p3hp | IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, 6.0.0.0 through 6.0.3.3, and 6.1.0.0 through 6.1.0.2 could allow an authenticated user to view pages they shoiuld not have access to due to improper authorization control. | [] | null | 4.3 | null | null |
|
CVE-2024-26817 | amdkfd: use calloc instead of kzalloc to avoid integer overflow | In the Linux kernel, the following vulnerability has been resolved:
amdkfd: use calloc instead of kzalloc to avoid integer overflow
This uses calloc instead of doing the multiplication which might
overflow. | [] | null | 5.5 | null | null |
GHSA-6qcc-737v-m9qh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Stored XSS. This issue affects CodeBard Help Desk: from n/a through 1.1.2. | [] | null | 6.5 | null | null |
|
RHSA-2003:119 | Red Hat Security Advisory: micq security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-9w57-8mw3-5g34 | The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print(). | [] | null | null | 9.8 | null |
|
GHSA-72pv-287m-jppg | Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized. | [] | null | 7.5 | null | null |
|
GHSA-444g-7h8r-45m8 | Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache. | [] | null | null | null | null |
|
GHSA-x6rw-m9v7-ff3g | A vulnerability in the implementation of Session Initiation Protocol (SIP) functionality in Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of SIP request messages by an affected device. An attacker could exploit this vulnerability by using formatted specifiers in a SIP payload that is sent to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. This vulnerability affects Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones that are running firmware release 7.6.2SR1 or earlier. Cisco Bug IDs: CSCvc63986. | [] | null | null | 7.5 | null |
|
ICSA-24-046-09 | Siemens SCALANCE SC-600 Family | Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device. Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device. Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator. Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again. Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. | [] | null | 7.2 | null | null |
GHSA-vpc9-72f2-g8fm | Intelbras NPLUG 1.0.0.14 devices have XSS via a crafted SSID that is received via a network broadcast. | [] | null | null | 6.1 | null |
|
CVE-2007-0775 | Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors. | [
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*"
] | null | null | null | 3.7 |
|
GHSA-x3vq-hc76-j6fw | IBM Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44750. | [] | null | 7.8 | null | null |
|
GHSA-qgp4-j735-8x9j | WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1. | [] | null | null | null | null |
|
GHSA-7rh5-jmc6-mmwm | A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the CloneSite plugin, allowing an attacker to inject SQL by manipulating the url parameter. | [] | null | 8.8 | null | null |
|
CVE-2022-0384 | Video Conferencing with Zoom < 3.8.17 - E-mail Address Disclosure | The Video Conferencing with Zoom WordPress plugin before 3.8.17 does not have authorisation in its vczapi_get_wp_users AJAX action, allowing any authenticated users, such as subscriber to download the list of email addresses registered on the blog | [
"cpe:2.3:a:imdpen:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | 4 |
GHSA-9h5j-cj9r-xxcp | Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 6, allow remote attackers to inject arbitrary web script or HTML, and possibly gain administrative privileges, via the (1) j_username or (2) j_password parameters in the login page (LoginForm.jsp), (3) parameters to the error page in the Administration Console, (4) unknown vectors in the Server Console while the administrator has an active session to obtain the ADMINCONSOLESESSION cookie, or (5) an alternate vector in the Server Console that does not require an active session but also leaks the username and password. | [] | null | null | null | null |
|
GHSA-w2pc-w76j-jcg2 | Stack-based buffer overflow in the Panel (xfce4-panel) component in Xfce before 4.4.2 might allow remote attackers to execute arbitrary code via Launcher tooltips. NOTE: a second buffer overflow (over-read) in the xfce_mkdirhier function was also reported, but it might not be exploitable for a crash or code execution, so it is not a vulnerability. | [] | null | null | null | null |
|
CVE-2020-12884 | A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options that may occur multiple consecutive times in a single packet. While processing the options, packet_data_pptr is accessed after being incremented by option_len without a prior out-of-bounds memory check. The temp_parsed_uri_query_ptr is validated for a correct range, but the range valid for temp_parsed_uri_query_ptr is derived from the amount of allocated heap memory, not the actual input size. Therefore the check of temp_parsed_uri_query_ptr may be insufficient for safe access to the area pointed to by packet_data_pptr. As a result, access to a memory area outside of the intended boundary of the packet buffer is made. | [
"cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
CVE-2015-7229 | The Twitter module 6.x-5.x before 6.x-5.2, 7.x-5.x before 7.x-5.9, and 7.x-6.x before 7.x-6.0 for Drupal does not properly check access permissions, which allows remote authenticated users to post tweets to arbitrary accounts by leveraging the (1) "post to twitter" permission or change the options for arbitrary attached accounts by leveraging the (2) "add twitter accounts" or (3) "add authenticated twitter accounts" permission. | [
"cpe:2.3:a:twitter_project:twitter:6.x-5.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:6.x-5.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:6.x-5.x:dev:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.5:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.6:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.7:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-5.8:*:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-6.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:twitter_project:twitter:7.x-6.0:alpha2:*:*:*:drupal:*:*"
] | null | null | null | 3.5 |
|
GHSA-6vqg-wm4f-f8vx | VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with editing access to views may be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations. | [] | null | 7.1 | null | null |
|
GHSA-c3qp-rmmf-2xjg | An issue was discovered in Eaton xComfort Ethernet Communication Interface (ECI) Versions 1.07 and prior. By accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access files without authenticating. | [] | null | null | 7.5 | null |
|
CVE-2023-22521 | This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crowd Data Center and Server.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.0, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.
Atlassian recommends that Crowd Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Crowd Data Center and Server 3.4: Upgrade to a release greater than or equal to 5.1.6
Crowd Data Center and Server 5.2: Upgrade to a release greater than or equal to 5.2.1
See the release notes ([https://confluence.atlassian.com/crowd/crowd-release-notes-199094.html]). You can download the latest version of Crowd Data Center and Server from the download center ([https://www.atlassian.com/software/crowd/download-archive]).
This vulnerability was discovered by m1sn0w and reported via our Bug Bounty program | [
"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:5.2.0:*:*:*:*:*:*:*"
] | null | null | 8 | null |
|
CVE-2020-12404 | For native-to-JS bridging the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token could leak when used for downloading files. This vulnerability affects Firefox for iOS < 26. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-4xrr-f7xc-v57p | A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file index.php of the component Reservation Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244944. | [] | null | 3.5 | null | null |
|
RHBA-2024:6585 | Red Hat Bug Fix Advisory: Updated rhel9/toolbox container image | glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
GHSA-4c24-fg5j-p435 | The Graphics Drivers subsystem in Apple OS X before 10.11.1 allows local users to gain privileges or cause a denial of service (kernel memory corruption) via unspecified vectors. | [] | null | null | null | null |
|
CVE-2012-3888 | The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data. | [
"cpe:2.3:a:airdroid:airdroid:1.0.4:beta:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-pq44-hr9j-8673 | An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar. | [] | null | 7.8 | null | null |
|
CVE-2023-29179 | A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, Fortiproxy version 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 allows attacker to denial of service via specially crafted HTTP requests. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
RHSA-2025:3848 | Red Hat Security Advisory: java-11-openjdk ELS security update | openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) | [
"cpe:/a:redhat:openjdk_els:11::el7",
"cpe:/a:redhat:openjdk_els:11::el8",
"cpe:/a:redhat:openjdk_els:11::el9"
] | null | 5.6 | null | null |
CVE-2023-49463 | libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc. | [
"cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-40677 | In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 8.4 | null | null |
|
GHSA-j3x5-cwfj-pfcw | Moodle does not force password changes for autosubscribed users | admin/uploaduser_form.php in Moodle 2.0.x before 2.0.3 does not force password changes for autosubscribed users, which makes it easier for remote attackers to obtain access by leveraging knowledge of the initial password of a new user. | [] | 6.9 | null | null | null |
CVE-2018-7420 | In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-vh27-qmfr-wr8c | A cross site scripting vulnerability in HPE Matrix Operating Environment version 7.6 was found. | [] | null | null | 5.4 | null |
|
GHSA-qpvc-9998-hvx9 | ** DISPUTED ** Jitsi-2.10.5550 was discovered to contain a vulnerability in its web UI which allows attackers to perform a clickjacking attack via a crafted HTTP request. NOTE: this is disputed by the vendor. | [] | null | 6.1 | null | null |
|
CVE-2024-12269 | Safe Ai Malware Protection for WP <= 1.0.17 - Missing Authorization to Unauthenticated Database Export | The Safe Ai Malware Protection for WP plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db() function in all versions up to, and including, 1.0.17. This makes it possible for unauthenticated attackers to retrieve a complete dump of the site's database. | [] | null | 7.5 | null | null |
CVE-2006-2321 | Multiple cross-site scripting (XSS) vulnerabilities in Ideal Science Ideal BB 1.5.4a and earlier allow remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: due to lack of details from the researcher, it is not clear whether this overlaps CVE-2004-2207. | [
"cpe:2.3:a:ideal_science:idealbb:1.5.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.0_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.3_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.3_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:ideal_science:idealbb:1.5.4a:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-mv73-f6f8-rcwp | JavaScriptCore in WebKit on Apple iPhone before 2.0 and iPod touch before 2.0 does not properly perform runtime garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger memory corruption, a different vulnerability than CVE-2008-2317. | [] | null | null | null | null |
|
RHSA-2017:2469 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: class verifier allowing Security Manager bypass OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: Nashorn incompletely blocking access to Java APIs (Scripting, 8171539) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.5 | null |
CVE-2019-0275 | SAML 1.1 SSO Demo Application in SAP NetWeaver Java Application Server (J2EE-APPS), versions 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40 and 7.50, does not sufficiently encode user-controlled inputs, which results in cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2017-17517 | libsylph/utils.c in Sylpheed through 3.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. | [
"cpe:2.3:a:sylpheed_project:sylpheed:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-32866 | The issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, watchOS 9, macOS Monterey 12.6, tvOS 16. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-3hqc-72mc-jjr3 | An issue in Wanxing Technology's Yitu project Management Software 3.2.2 allows a remote attacker to execute arbitrary code via the platformpluginpath parameter to specify that the qt plugin loads the directory. | [] | null | 9.8 | null | null |
|
CVE-2021-29773 | IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR). IBM X-Force ID: 202865. | [
"cpe:2.3:a:ibm:security_guardium:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-3xxm-cx7p-m4p6 | joyplus-cms 1.6.0 has CSRF, as demonstrated by adding an administrator account via a manager/admin_ajax.php?action=save&tab={pre}manager request. | [] | null | null | 8.8 | null |
|
RHSA-2022:5769 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | 6.1 | null |
GHSA-pv3m-59xf-7cp6 | Buffer overflow in the ExecCall method in c2lv6.ocx in the FreeBit ELPhoneBtnV6 ActiveX control allows remote attackers to execute arbitrary code via a crafted HTML document, related to the discontinued "Click to Live" service. | [] | null | null | null | null |
|
RHSA-2015:2512 | Red Hat Security Advisory: Red Hat Ceph Storage 1.3.1 security, bug fix, and enhancement update | Ceph: RGW returns requested bucket name raw in Bucket response header | [
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | null | null |
GHSA-6h2h-qgx7-79mr | Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image. | [] | null | null | 6.5 | null |
|
CVE-2015-4323 | Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.9); Nexus 3000 devices 6.0(2)U5(1.41), 7.0(3)I2(0.373), and 7.3(0)ZN(0.83); Nexus 4000 devices 4.1(2)E1(1b); Nexus 7000 devices 6.2(14)S1; Nexus 9000 devices 7.3(0)ZN(0.9); and MDS 9000 devices 6.2 (13) and 7.1(0)ZN(91.99) and MDS SAN-OS 7.1(0)ZN(91.99) allows remote attackers to cause a denial of service (device outage) via a crafted ARP packet, related to incorrect MTU validation, aka Bug IDs CSCuv71933, CSCuv61341, CSCuv61321, CSCuu78074, CSCut37060, CSCuv61266, CSCuv61351, CSCuv61358, and CSCuv61366. | [
"cpe:2.3:o:cisco:nx-os:6.2\\(14\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1.41\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(0.373\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)zn\\(0.83\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)zn\\(0.9\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:mds_9000_nx-os:6.2\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:mds_9000_nx-os:7.1\\(0\\)zn\\(91.99\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*"
] | null | null | null | 6.1 |
|
CVE-2018-3867 | An exploitable stack-based buffer overflow vulnerability exists in the samsungWifiScan callback notification of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly handles the answer received from a smart camera, leading to a buffer overflow on the stack. An attacker can send a series of HTTP requests to trigger this vulnerability. | [
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
] | null | null | 9.9 | null |
|
GHSA-m973-4vpc-x43c | Graphite Web Cross-site Scripting vulnerability | A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744. | [] | null | 5.4 | null | null |
cisco-sa-fmc-infdisc-guJWRwQu | Cisco Firepower Management Center Software Information Disclosure Vulnerability | A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization.
This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"]. | [] | null | null | 4.3 | null |
GHSA-wv9w-gw9c-464q | Improper directory permissions in Intel(R) ACU Wizard version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | null | 7.8 | null |
|
GHSA-hx2x-p3w3-x6vh | goform/formEMR30 in Sumavision Enhanced Multimedia Router (EMR) 3.0.4.27 allows creation of arbitrary users with elevated privileges (administrator) on a device, as demonstrated by a setString=new_user<*1*>administrator<*1*>123456 request. | [] | null | 9.8 | null | null |
|
GHSA-9h74-fvjc-4388 | Opera 6.0.3, when using Squid 2.4 for HTTPS proxying, does not properly handle when accepting a non-global certificate authority (CA) certificate from a site and establishing a subsequent HTTPS connection, which allows remote attackers to cause a denial of service (crash). | [] | null | null | null | null |
|
CVE-2023-0720 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. | [
"cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
|
CVE-2018-20904 | cPanel before 71.9980.37 allows attackers to make API calls that bypass the cron feature restriction (SEC-427). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
CVE-2018-2504 | SAP NetWeaver AS Java Web Container service does not validate against whitelist the HTTP host header which can result in HTTP Host Header Manipulation or Cross-Site Scripting (XSS) vulnerability. This is fixed in versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50. | [
"cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2022-49830 | drm/drv: Fix potential memory leak in drm_dev_init() | In the Linux kernel, the following vulnerability has been resolved:
drm/drv: Fix potential memory leak in drm_dev_init()
drm_dev_init() will add drm_dev_init_release() as a callback. When
drmm_add_action() failed, the release function won't be added. As the
result, the ref cnt added by device_get() in drm_dev_init() won't be put
by drm_dev_init_release(), which leads to the memleak. Use
drmm_add_action_or_reset() instead of drmm_add_action() to prevent
memleak.
unreferenced object 0xffff88810bc0c800 (size 2048):
comm "modprobe", pid 8322, jiffies 4305809845 (age 15.292s)
hex dump (first 32 bytes):
e8 cc c0 0b 81 88 ff ff ff ff ff ff 00 00 00 00 ................
20 24 3c 0c 81 88 ff ff 18 c8 c0 0b 81 88 ff ff $<.............
backtrace:
[<000000007251f72d>] __kmalloc+0x4b/0x1c0
[<0000000045f21f26>] platform_device_alloc+0x2d/0xe0
[<000000004452a479>] platform_device_register_full+0x24/0x1c0
[<0000000089f4ea61>] 0xffffffffa0736051
[<00000000235b2441>] do_one_initcall+0x7a/0x380
[<0000000001a4a177>] do_init_module+0x5c/0x230
[<000000002bf8a8e2>] load_module+0x227d/0x2420
[<00000000637d6d0a>] __do_sys_finit_module+0xd5/0x140
[<00000000c99fc324>] do_syscall_64+0x3f/0x90
[<000000004d85aa77>] entry_SYSCALL_64_after_hwframe+0x63/0xcd | [] | null | null | null | null |
CVE-2013-3558 | The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-33509 | Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script. | [
"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | 8.5 |
|
RHSA-2017:0879 | Red Hat Security Advisory: v8 security update | V8: integer overflow leading to buffer overflow in Zone::New | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.6 | null |
GHSA-rmjx-qrw2-mx8p | An ActiveX control in YahooBridgeLib.dll for Yahoo! Messenger 9.0.0.2162, and possibly other 9.0 versions, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by calling the RegisterMe method with a long argument. | [] | null | null | null | null |
|
CVE-2011-4028 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to determine the existence of arbitrary files via a symlink attack on a temporary lock file, which is handled differently if the file exists. | [
"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*"
] | null | null | null | 1.2 |
|
GHSA-jcq5-jvvp-5h5v | Vulnerability in the PeopleSoft Enterprise HCM eProfile Manager Desktop component of Oracle PeopleSoft Products (subcomponent: Guided Self Service). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM eProfile Manager Desktop. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM eProfile Manager Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM eProfile Manager Desktop accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM eProfile Manager Desktop accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
CVE-2023-25802 | Roxy-WI has Path Traversal vulnerability | Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue. | [
"cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-6gx2-pm9f-4xqw | In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [] | null | 7.8 | null | null |
|
GHSA-hv6f-j4gh-pcgv | Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter. | [] | null | null | null | null |
|
CVE-2019-17100 | Untrusted Search Path vulnerability in Bitdefender Total Security 2020 (VA-5895) | An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69. | [
"cpe:2.3:a:bitdefender:total_security_2020:*:*:*:*:*:*:*:*"
] | null | 5.2 | null | null |
CVE-2013-0681 | Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed data in a formatted text command. | [
"cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:opc_datahub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:opc_datahub:6.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cascade_datahub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cascade_datahub:6.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:datahub_quicktrend:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-cf97-gpjm-x8fj | In the Linux kernel, the following vulnerability has been resolved:ksmbd: Fix the missing xa_store error checkxa_store() can fail, it return xa_err(-EINVAL) if the entry cannot
be stored in an XArray, or xa_err(-ENOMEM) if memory allocation failed,
so check error for xa_store() to fix it. | [] | null | 5.5 | null | null |
|
GHSA-6j2m-q5wc-88mc | Multiple SQL injection vulnerabilities in Easy-Content Forums 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) startletter parameter in userview.asp and the (2) forumname parameter in topics.asp. | [] | null | null | null | null |
|
CVE-2018-11801 | SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table. | [
"cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-h293-gm2x-59x5 | A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/{id}/edit/. | [] | null | 6.1 | null | null |
|
GHSA-4j56-gwfc-85w2 | Multiple PHP remote file inclusion vulnerabilities in ClearSite Beta 4.50, and possibly other versions, allow remote attackers to execute arbitrary PHP code via a URL in the cs_base_path parameter to (1) docs.php and (2) include/admin/device_admin.php. NOTE: the header.php vector is already covered by CVE-2009-3306. NOTE: this issue may be due to a variable extraction error. | [] | null | null | null | null |
|
CVE-2020-2703 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36 and prior to 6.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
CVE-2010-4294 | The frame decompression functionality in the VMnc media codec in VMware Movie Decoder before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548 on Windows, VMware Player 2.5.x before 2.5.5 build 246459 and 3.x before 3.1.2 build 301548 on Windows, and VMware Server 2.x on Windows does not properly validate an unspecified size field, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted video file. | [
"cpe:2.3:a:vmware:movie_decoder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:movie_decoder:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:movie_decoder:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:movie_decoder:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:movie_decoder:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-18982 | bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
ICSA-19-136-02 | Fuji Electric Alpha7 PC Loader | An out-of-bounds read vulnerability has been identified, which may crash the system.CVE-2019-10975 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). | [] | null | null | 3.3 | null |
GHSA-rq57-hqjh-94jr | Cross-site scripting (XSS) vulnerability in adduser.php in PHP-AGTC Membership System 1.1a and earlier allows remote attackers to inject arbitrary web script or HTML via the email address (useremail parameter). | [] | null | null | null | null |
|
CVE-2024-0763 | Improper validation of document removal parameter | Any user can delete an arbitrary folder (recursively) on a remote server due to bad input sanitization leading to path traversal. The attacker would need access to the server at some privilege level since this endpoint is protected and requires authorization. | [
"cpe:2.3:a:mintplexlabs:anythingllm:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
CVE-2022-49759 | VMCI: Use threaded irqs instead of tasklets | In the Linux kernel, the following vulnerability has been resolved:
VMCI: Use threaded irqs instead of tasklets
The vmci_dispatch_dgs() tasklet function calls vmci_read_data()
which uses wait_event() resulting in invalid sleep in an atomic
context (and therefore potentially in a deadlock).
Use threaded irqs to fix this issue and completely remove usage
of tasklets.
[ 20.264639] BUG: sleeping function called from invalid context at drivers/misc/vmw_vmci/vmci_guest.c:145
[ 20.264643] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 762, name: vmtoolsd
[ 20.264645] preempt_count: 101, expected: 0
[ 20.264646] RCU nest depth: 0, expected: 0
[ 20.264647] 1 lock held by vmtoolsd/762:
[ 20.264648] #0: ffff0000874ae440 (sk_lock-AF_VSOCK){+.+.}-{0:0}, at: vsock_connect+0x60/0x330 [vsock]
[ 20.264658] Preemption disabled at:
[ 20.264659] [<ffff80000151d7d8>] vmci_send_datagram+0x44/0xa0 [vmw_vmci]
[ 20.264665] CPU: 0 PID: 762 Comm: vmtoolsd Not tainted 5.19.0-0.rc8.20220727git39c3c396f813.60.fc37.aarch64 #1
[ 20.264667] Hardware name: VMware, Inc. VBSA/VBSA, BIOS VEFI 12/31/2020
[ 20.264668] Call trace:
[ 20.264669] dump_backtrace+0xc4/0x130
[ 20.264672] show_stack+0x24/0x80
[ 20.264673] dump_stack_lvl+0x88/0xb4
[ 20.264676] dump_stack+0x18/0x34
[ 20.264677] __might_resched+0x1a0/0x280
[ 20.264679] __might_sleep+0x58/0x90
[ 20.264681] vmci_read_data+0x74/0x120 [vmw_vmci]
[ 20.264683] vmci_dispatch_dgs+0x64/0x204 [vmw_vmci]
[ 20.264686] tasklet_action_common.constprop.0+0x13c/0x150
[ 20.264688] tasklet_action+0x40/0x50
[ 20.264689] __do_softirq+0x23c/0x6b4
[ 20.264690] __irq_exit_rcu+0x104/0x214
[ 20.264691] irq_exit_rcu+0x1c/0x50
[ 20.264693] el1_interrupt+0x38/0x6c
[ 20.264695] el1h_64_irq_handler+0x18/0x24
[ 20.264696] el1h_64_irq+0x68/0x6c
[ 20.264697] preempt_count_sub+0xa4/0xe0
[ 20.264698] _raw_spin_unlock_irqrestore+0x64/0xb0
[ 20.264701] vmci_send_datagram+0x7c/0xa0 [vmw_vmci]
[ 20.264703] vmci_datagram_dispatch+0x84/0x100 [vmw_vmci]
[ 20.264706] vmci_datagram_send+0x2c/0x40 [vmw_vmci]
[ 20.264709] vmci_transport_send_control_pkt+0xb8/0x120 [vmw_vsock_vmci_transport]
[ 20.264711] vmci_transport_connect+0x40/0x7c [vmw_vsock_vmci_transport]
[ 20.264713] vsock_connect+0x278/0x330 [vsock]
[ 20.264715] __sys_connect_file+0x8c/0xc0
[ 20.264718] __sys_connect+0x84/0xb4
[ 20.264720] __arm64_sys_connect+0x2c/0x3c
[ 20.264721] invoke_syscall+0x78/0x100
[ 20.264723] el0_svc_common.constprop.0+0x68/0x124
[ 20.264724] do_el0_svc+0x38/0x4c
[ 20.264725] el0_svc+0x60/0x180
[ 20.264726] el0t_64_sync_handler+0x11c/0x150
[ 20.264728] el0t_64_sync+0x190/0x194 | [] | null | 5.5 | null | null |
GHSA-pwr7-5mhg-h3w9 | The WP Wiki Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wiki' shortcode in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-w6px-gr65-fm3g | IBM Jazz Foundation products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192957. | [] | null | null | null | null |
|
GHSA-74hg-7r85-vvw3 | In the Linux kernel, the following vulnerability has been resolved:PCI: aardvark: Fix kernel panic during PIO transferTrying to start a new PIO transfer by writing value 0 in PIO_START register
when previous transfer has not yet completed (which is indicated by value 1
in PIO_START) causes an External Abort on CPU, which results in kernel
panic:To prevent kernel panic, it is required to reject a new PIO transfer when
previous one has not finished yet.If previous PIO transfer is not finished yet, the kernel may issue a new
PIO request only if the previous PIO transfer timed out.In the past the root cause of this issue was incorrectly identified (as it
often happens during link retraining or after link down event) and special
hack was implemented in Trusted Firmware to catch all SError events in EL3,
to ignore errors with code 0xbf000002 and not forwarding any other errors
to kernel and instead throw panic from EL3 Trusted Firmware handler.Links to discussion and patches about this issue:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50
https://lore.kernel.org/linux-pci/[email protected]/
https://lore.kernel.org/linux-pci/[email protected]/
https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541But the real cause was the fact that during link retraining or after link
down event the PIO transfer may take longer time, up to the 1.44s until it
times out. This increased probability that a new PIO transfer would be
issued by kernel while previous one has not finished yet.After applying this change into the kernel, it is possible to revert the
mentioned TF-A hack and SError events do not have to be caught in TF-A EL3. | [] | null | 5.5 | null | null |
|
GHSA-x8fr-x23c-rhhg | A Command Execution vulnerability exists in Sphider before 1.3.6 due to insufficient sanitization of fwrite to conf.php, which could let a remote malicious user execute arbitrary code. CVE-2014-5083 pertains to instances of fwrite in Sphider. | [] | null | null | null | null |
|
CVE-2008-3634 | Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be absent if the administrator were given better information. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.72:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2021-30762 | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-3rhh-97v9-2g42 | In setMediaButtonReceiver of MediaSessionRecord.java, there is a possible way to send a pending intent on behalf of system_server due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | [] | null | 8.4 | null | null |
|
CVE-2009-0358 | Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
GHSA-wj3f-f94q-2r98 | A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected. | [] | null | null | 8.8 | null |
|
RHSA-2021:2301 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 5.6 | null | null |
GHSA-f587-8mf8-x559 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows Stored XSS. This issue affects Black Widgets For Elementor: from n/a through 1.3.9. | [] | null | 6.5 | null | null |
|
CVE-2024-9760 | Tungsten Automation Power PDF PNG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Tungsten Automation Power PDF PNG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PNG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24476. | [
"cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
CVE-2018-10622 | Medtronic MyCareLink 24950 Patient Monitor Storing Passwords in a Recoverable Format | Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest. | [
"cpe:2.3:o:medtronic:mycarelink_24952_patient_monitor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:mycarelink_24952_patient_monitor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:mycarelink_24950_patient_monitor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:mycarelink_24950_patient_monitor:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.