id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2008-1026 | Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-1651 | A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-c3vc-j27v-38gp | IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user. IBM X-Force ID: 144958. | [] | null | null | 6.3 | null |
|
CVE-2019-13477 | In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.837, CSRF in the forgot password function allows an attacker to change the password for the root account. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.837:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.3 |
|
CVE-2005-2549 | Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers. | [
"cpe:2.3:a:gnome:evolution:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4f7j-px6v-m38x | Wazuh SIEM version 4.8.2 is affected by a broken access control vulnerability. This issue allows the unauthorized creation of internal users without assigning any existing user role, potentially leading to privilege escalation or unauthorized access to sensitive resources. | [] | null | 7.3 | null | null |
|
GHSA-87x2-4xvf-5x6q | The Simple File List WordPress plugin before 4.4.12 does not escape parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting | [] | null | 6.1 | null | null |
|
CVE-2023-5338 | The Theme Blvd Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:themeblvd:theme_blvd_shortcodes:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
GHSA-p3m4-jx3q-wpfv | Cross-site scripting (XSS) vulnerability in the "Basic Toolbar Selection" in FCKEditor allows remote attackers to execute arbitrary JavaScript via the javascript: URI in the (1) href or (2) onmouseover attribute of the A HTML tag. | [] | null | null | null | null |
|
GHSA-rjjc-6m8h-5xcf | A vulnerability classified as critical has been found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/app/login_crud.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255375. | [] | null | 4.7 | null | null |
|
GHSA-947j-6w79-84r8 | Mengshen Wireless Door Alarm M70 2024-05-24 allows Authentication Bypass via a Capture-Replay approach. | [] | null | 6.8 | null | null |
|
CVE-2019-2691 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2000-0733 | Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. | [
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-32g6-mp97-8qcx | SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity. | [] | null | null | null | null |
|
GHSA-f7c7-pw5m-vrm3 | Absolute path traversal vulnerability in the Data Dynamics ActiveReport (ActiveReports) ActiveX control in actrpt2.dll 2.5 and earlier allows remote attackers to create or overwrite arbitrary files via a full pathname in the first argument to the SaveLayout method. | [] | null | null | null | null |
|
CVE-2022-24510 | Microsoft Office Visio Remote Code Execution Vulnerability | Microsoft Office Visio Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*"
] | null | 7.8 | null | null |
CVE-2008-0610 | Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value. | [
"cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:*",
"cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:*",
"cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-cj62-hc3c-q4gw | The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654. | [] | null | null | 5.3 | null |
|
GHSA-g9j3-v5q7-8mm4 | The server in Symantec Workspace Streaming (SWS) before 7.5.0.749 allows remote attackers to access files and functionality by sending a crafted XMLRPC request over HTTPS. | [] | null | null | null | null |
|
CVE-2013-1555 | Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-74fc-8pm6-2r48 | Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction | [] | null | 6.5 | null | null |
|
GHSA-4g2w-8wrj-cvhc | A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /sys/user/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
GHSA-m4xq-j92p-g2p4 | The Payment module 7.x-1.x before 7.x-1.3 for Drupal does not properly restrict access to payments, which allows remote attackers to read arbitrary payments. | [] | null | null | null | null |
|
GHSA-74mf-vjpg-9xh7 | Slim vulnerable to PHP object injection | Middleware/SessionCookie.php in Slim before 2.6.0 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via crafted session data. | [] | null | null | null | null |
RHSA-2023:0770 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7 | null | null |
CVE-2022-0142 | Visual Form Builder < 3.0.6 - CSV Injection | The Visual Form Builder WordPress plugin before 3.0.8 is vulnerable to CSV injection allowing a user with low level or no privileges to inject a command that will be included in the exported CSV file, leading to possible code execution. | [
"cpe:2.3:a:vfbpro:visual_form_builder:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 |
CVE-2017-14299 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-3qcp-g78m-7jv9 | A privilege escalation vulnerability exists in SolarWinds Serv-U before 15.1.7 for Linux. | [] | null | 8.8 | null | null |
|
GHSA-c7rj-fx5f-q8qw | Microsoft Excel Viewer (aka Xlview.exe) and Excel in Microsoft Office 2007 (aka Office 12) allow remote attackers to cause a denial of service (read access violation and application crash) via a crafted spreadsheet file, as demonstrated by a .xls file with battery voltage data. | [] | null | null | null | null |
|
GHSA-xjv4-5hjm-mw83 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | [] | null | 7.8 | null | null |
|
CVE-2020-3279 | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. | [
"cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
GHSA-ggxf-hwrw-c5q2 | In the Linux kernel, the following vulnerability has been resolved:btrfs: don't readahead the relocation inode on RSTOn relocation we're doing readahead on the relocation inode, but if the
filesystem is backed by a RAID stripe tree we can get ENOENT (e.g. due to
preallocated extents not being mapped in the RST) from the lookup.But readahead doesn't handle the error and submits invalid reads to the
device, causing an assertion in the scatter-gather list code:BTRFS info (device nvme1n1): balance: start -d -m -s
BTRFS info (device nvme1n1): relocating block group 6480920576 flags data|raid0
BTRFS error (device nvme1n1): cannot find raid-stripe for logical [6481928192, 6481969152] devid 2, profile raid0
------------[ cut here ]------------
kernel BUG at include/linux/scatterlist.h:115!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 1012 Comm: btrfs Not tainted 6.10.0-rc7+ #567
RIP: 0010:__blk_rq_map_sg+0x339/0x4a0
RSP: 0018:ffffc90001a43820 EFLAGS: 00010202
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffea00045d4802
RDX: 0000000117520000 RSI: 0000000000000000 RDI: ffff8881027d1000
RBP: 0000000000003000 R08: ffffea00045d4902 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000001000 R12: ffff8881003d10b8
R13: ffffc90001a438f0 R14: 0000000000000000 R15: 0000000000003000
FS: 00007fcc048a6900(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002cd11000 CR3: 00000001109ea001 CR4: 0000000000370eb0
Call Trace:
<TASK>
? __die_body.cold+0x14/0x25
? die+0x2e/0x50
? do_trap+0xca/0x110
? do_error_trap+0x65/0x80
? __blk_rq_map_sg+0x339/0x4a0
? exc_invalid_op+0x50/0x70
? __blk_rq_map_sg+0x339/0x4a0
? asm_exc_invalid_op+0x1a/0x20
? __blk_rq_map_sg+0x339/0x4a0
nvme_prep_rq.part.0+0x9d/0x770
nvme_queue_rq+0x7d/0x1e0
__blk_mq_issue_directly+0x2a/0x90
? blk_mq_get_budget_and_tag+0x61/0x90
blk_mq_try_issue_list_directly+0x56/0xf0
blk_mq_flush_plug_list.part.0+0x52b/0x5d0
__blk_flush_plug+0xc6/0x110
blk_finish_plug+0x28/0x40
read_pages+0x160/0x1c0
page_cache_ra_unbounded+0x109/0x180
relocate_file_extent_cluster+0x611/0x6a0
? btrfs_search_slot+0xba4/0xd20
? balance_dirty_pages_ratelimited_flags+0x26/0xb00
relocate_data_extent.constprop.0+0x134/0x160
relocate_block_group+0x3f2/0x500
btrfs_relocate_block_group+0x250/0x430
btrfs_relocate_chunk+0x3f/0x130
btrfs_balance+0x71b/0xef0
? kmalloc_trace_noprof+0x13b/0x280
btrfs_ioctl+0x2c2e/0x3030
? kvfree_call_rcu+0x1e6/0x340
? list_lru_add_obj+0x66/0x80
? mntput_no_expire+0x3a/0x220
__x64_sys_ioctl+0x96/0xc0
do_syscall_64+0x54/0x110
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fcc04514f9b
Code: Unable to access opcode bytes at 0x7fcc04514f71.
RSP: 002b:00007ffeba923370 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fcc04514f9b
RDX: 00007ffeba923460 RSI: 00000000c4009420 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000013 R09: 0000000000000001
R10: 00007fcc043fbba8 R11: 0000000000000246 R12: 00007ffeba924fc5
R13: 00007ffeba923460 R14: 0000000000000002 R15: 00000000004d4bb0
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__blk_rq_map_sg+0x339/0x4a0
RSP: 0018:ffffc90001a43820 EFLAGS: 00010202
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffea00045d4802
RDX: 0000000117520000 RSI: 0000000000000000 RDI: ffff8881027d1000
RBP: 0000000000003000 R08: ffffea00045d4902 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000001000 R12: ffff8881003d10b8
R13: ffffc90001a438f0 R14: 0000000000000000 R15: 0000000000003000
FS: 00007fcc048a6900(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcc04514f71 CR3: 00000001109ea001 CR4: 0000000000370eb0
Kernel p
---truncated--- | [] | null | 5.5 | null | null |
|
CVE-2023-26848 | TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the org parameter at setting/delStaticDhcpRules. | [
"cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-w8c2-pprx-fp4v | An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Foundation" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file. | [] | null | null | 7.8 | null |
|
CVE-2021-21020 | Magento Commerce Improper Access Control Vulnerability | Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an access control bypass vulnerability in the Login as Customer module. Successful exploitation could lead to unauthorized access to restricted resources. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:open_source:*:*:*"
] | null | null | 5.3 | null |
CVE-2023-39983 | MXsecurity Register Database Pollution | A vulnerability that poses a potential risk of polluting the MXsecurity sqlite database and the nsm-web UI has been identified in MXsecurity versions prior to v1.0.1. This vulnerability might allow an unauthenticated remote attacker to register or add devices via the nsm-web application.
| [
"cpe:2.3:a:moxa:mxsecurity:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-ph47-5xqg-mr4x | In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645167. | [] | null | 6.7 | null | null |
|
GHSA-p727-qf39-fqgx | cPanel before 60.0.25 allows self XSS in the UI_confirm API (SEC-180). | [] | null | null | 5.4 | null |
|
GHSA-c57x-rcwf-fx5x | Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A | [] | null | 7.5 | null | null |
|
CVE-2015-0073 | The Windows Registry Virtualization feature in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict changes to virtual stores, which allows local users to gain privileges via a crafted application, aka "Registry Virtualization Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2010:0660 | Red Hat Security Advisory: kernel security and bug fix update | kernel: mm: keep a guard page below a grow-down stack segment kernel: gfs2: rename causes kernel panic | [
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
CVE-2016-6206 | Huawei AR3200 routers with software before V200R007C00SPC600 allow remote attackers to cause a denial of service or execute arbitrary code via a crafted packet. | [
"cpe:2.3:o:huawei:ar3200_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r002c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r002c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r002c05:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r003c05:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c21:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c31:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c12:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c15:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c16:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c17:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2023-4672 | XSS in Talent Soft's ECOP | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Talent Software ECOP allows Reflected XSS.This issue affects ECOP: before 32255.
| [
"cpe:2.3:a:talentyazilim:ecop:32255:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-5mmf-rjpr-m4cj | In the Linux kernel, the following vulnerability has been resolved:fork: only invoke khugepaged, ksm hooks if no errorThere is no reason to invoke these hooks early against an mm that is in an
incomplete state.The change in commit d24062914837 ("fork: use __mt_dup() to duplicate
maple tree in dup_mmap()") makes this more pertinent as we may be in a
state where entries in the maple tree are not yet consistent.Their placement early in dup_mmap() only appears to have been meaningful
for early error checking, and since functionally it'd require a very small
allocation to fail (in practice 'too small to fail') that'd only occur in
the most dire circumstances, meaning the fork would fail or be OOM'd in
any case.Since both khugepaged and KSM tracking are there to provide optimisations
to memory performance rather than critical functionality, it doesn't
really matter all that much if, under such dire memory pressure, we fail
to register an mm with these.As a result, we follow the example of commit d2081b2bf819 ("mm:
khugepaged: make khugepaged_enter() void function") and make ksm_fork() a
void function also.We only expose the mm to these functions once we are done with them and
only if no error occurred in the fork operation. | [] | null | 5.5 | null | null |
|
CVE-2019-9167 | Cross-site scripting (XSS) vulnerability in Nagios XI before 5.5.11 allows attackers to inject arbitrary web script or HTML via the xiwindow parameter. | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-q7j7-c4rf-9cfp | A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device. The vulnerability is due to insufficient bounds checking in the DMo process. An attacker could exploit this vulnerability by sending crafted packets that are forwarded to the DMo process for evaluation. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. This vulnerability affects the following Cisco 800 Series Industrial Integrated Services Routers: Cisco IR809 and Cisco IR829. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52330. | [] | null | null | 9.8 | null |
|
RHSA-2022:7238 | Red Hat Security Advisory: Red Hat OpenStack Platform (puppet-mysql) security update | Puppetlabs-mysql: Command Injection in the puppetlabs-mysql module | [
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 8.4 | null | null |
CVE-2019-16128 | Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 1 of 2). | [
"cpe:2.3:a:microchip:cryptoauthlib:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 |
|
CVE-2024-7933 | itsourcecode Project Expense Monitoring System Backend Login login1.php sql injection | A vulnerability was found in itsourcecode Project Expense Monitoring System 1.0. It has been classified as critical. Affected is an unknown function of the file login1.php of the component Backend Login. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:itsourcecode:project_expense_monitoring_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:project_expense_monitoring_system_project:project_expense_monitoring_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-9c2p-jfmw-fgw7 | ** DISPUTED ** An issue was discovered in Qualys Cloud Agent 4.8.0-49. It writes "ps auxwwe" output to the /var/log/qualys/qualys-cloud-agent-scan.log file. This may, for example, unexpectedly write credentials (from environment variables) to disk in cleartext. NOTE: there are no common circumstances in which qualys-cloud-agent-scan.log can be read by a user other than root; however, the file contents could be exposed through site-specific operational practices. The vendor does NOT characterize this as a vulnerability because the ps data collection is intentional, and would only capture credentials on a machine that was already affected by the CWE-214 weakness. | [] | null | 7.5 | null | null |
|
GHSA-4gq9-jp3j-mwwg | The Nested Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.7. This is due to missing or incorrect nonce validation on the 'settingsPage' function and missing santization of the 'tab' parameter. This makes it possible for unauthenticated attackers to call local php files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 8.8 | null | null |
|
RHSA-2024:8102 | Red Hat Security Advisory: python-gevent security update | python-gevent: privilege escalation via a crafted script to the WSGIServer component | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.1 | null | null |
CVE-2023-35737 | D-Link DAP-2622 DDP Configuration Backup Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-2622 DDP Configuration Backup Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20064. | [
"cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-px4h-jjhx-vcmc | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code. | [] | null | null | null | null |
|
ICSA-21-313-01 | Schneider Electric NMC cards and Embedded Devices | A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC pointing to a delete policy file.CVE-2021-22810 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). A vulnerability could cause script execution when the request of a privileged account accessing the vulnerable web page is intercepted.CVE-2021-22811 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC.CVE-2021-22812 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC pointing to an edit policy file.CVE-2021-22813 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). A vulnerability could cause arbitrary script execution when a malicious file is read and displayed.CVE-2021-22814 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). A vulnerability could allow the troubleshooting archive to be accessed.CVE-2021-22815 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 5.3 | null |
CVE-2023-41234 | NULL pointer dereference in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable denial of service via local access. | [
"cpe:2.3:a:intel:power_gadget_software:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
|
GHSA-5v49-g977-2v3w | Directory traversal vulnerability in unb_lib/abbc.conf.php in Unclassified NewsBoard (UNB) 1.6.1 patch 1 and earlier, when register_globals is enabled, allows remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing null byte (%00) in the ABBC[Config][smileset] parameter to unb_lib/abbc.css.php. | [] | null | null | null | null |
|
CVE-2002-1988 | Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. | [
"cpe:2.3:a:caucho_technology:resin:2.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
PYSEC-2024-30 | null | The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). Prior to 4.2.0, authenticated users could inject code into algorithm environment variables, resulting in remote code execution. This vulnerability is patched in 4.2.0. | [] | null | 8.8 | null | null |
GHSA-r3gq-r28g-g674 | A vulnerability was found in JIZHICMS 2.4.5. It has been classified as critical. Affected is the function index of the file TemplateController.php. The manipulation of the argument webapi leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230082 is the identifier assigned to this vulnerability. | [] | null | null | 6.3 | null |
|
CVE-2017-16115 | The timespan module is vulnerable to regular expression denial of service. Given 50k characters of untrusted user input it will block the event loop for around 10 seconds. | [
"cpe:2.3:a:timespan_project:timespan:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2021:0991 | Red Hat Security Advisory: firefox security update | Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
CVE-2012-5821 | Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function. | [
"cpe:2.3:a:lynx:lynx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | 5.9 | null | 5.8 |
|
CVE-2007-2317 | Multiple PHP remote file inclusion vulnerabilities in MiniBB Forum 1.5a and earlier, as used by TOSMO/Mambo 4.0.12 and probably other products, allow remote attackers to execute arbitrary PHP code via a URL in the absolute_path parameter to bb_plugins.php in (1) components/minibb/ or (2) components/com_minibb, or (3) configuration.php. NOTE: the com_minibb.php vector is already covered by CVE-2006-3690. | [
"cpe:2.3:a:minibb:minibb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tosmo_mambo:tosmo_mambo:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rf3p-79w2-25vp | lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program. | [] | null | null | null | null |
|
GHSA-mw2x-vj4g-jgwf | Cross-site scripting (XSS) vulnerability in the JFaq (com_jfaq) component 1.2 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the question parameter in an add2 action to index.php. | [] | null | null | null | null |
|
CVE-2023-35987 | PiiGAB M-Bus Use of Hard-coded Credentials |
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.
| [
"cpe:2.3:h:piigab:m-bus_900s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:piigab:m-bus_900s_firmware:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2024-13314 | Carousel, Slider, Gallery by WP Carousel < 2.7.4 - Admin+ Stored XSS | The Carousel, Slider, Gallery by WP Carousel WordPress plugin before 2.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 3.5 | null | null |
GHSA-2gp4-84j2-ghj7 | Equinox Control Expert all versions, is vulnerable to an SQL injection attack, which may allow an attacker to remotely execute arbitrary code. | [] | null | 9.8 | null | null |
|
CVE-2020-5686 | Incorrect implementation of authentication algorithm issue in UNIVERGE SV9500 series from V1 to V7and SV8500 series from S6 to S8 allows an attacker to access the remote system maintenance feature and obtain the information by sending a specially crafted request to a specific URL. | [
"cpe:2.3:o:nec:univerge_sv9500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:univerge_sv9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:univerge_sv8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:univerge_sv8500:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-mq9c-rx7q-5jph | The SAP Web Dispatcher - versions WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.85, WEBDISP 7.89, WEBDISP 7.91, WEBDISP 7.92, WEBDISP 7.93, KERNEL 7.53, KERNEL 7.54 KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KRNL64UC 7.53, HDB 2.00, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, has a vulnerability that can be exploited by an unauthenticated attacker to cause memory corruption through logical errors in memory management this may leads to information disclosure or system crashes, which can have low impact on confidentiality and high impact on the integrity and availability of the system. | [] | null | 7.7 | null | null |
|
CVE-2023-2575 | Authenticated Buffer Overflow | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request. | [
"cpe:2.3:o:advantech:eki-1521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-1522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:advantech:eki-1524_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:eki-1524:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-6w3p-5v24-hp57 | Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | 8.8 | null | null |
|
GHSA-2x64-ch34-4p29 | Format string vulnerability in DbgPrint function, used in debug messages for some Windows NT drivers (possibly when called through DebugMessage), may allow local users to gain privileges. | [] | null | null | null | null |
|
GHSA-xh98-g799-3775 | The Opera Mobile application before 12.1 and Opera Mini application before 7.5 for Android do not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application. | [] | null | null | null | null |
|
GHSA-grvm-c676-wgqq | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.75, D6000 before V1.0.0.75, D6100 before V1.0.0.63, R7800 before v1.0.2.52, R8900 before v1.0.4.2, R9000 before v1.0.4.2, RBK50 before v2.3.0.32, RBR50 before v2.3.0.32, RBS50 before v2.3.0.32, WNDR3700v4 before V1.0.2.102, WNDR4300v1 before V1.0.2.104, WNDR4300v2 before v1.0.0.58, WNDR4500v3 before v1.0.0.58, WNR2000v5 before v1.0.0.68, and XR500 before V2.3.2.32. | [] | null | null | null | null |
|
CVE-2023-6892 | The EAN for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'alg_wc_ean_product_meta' shortcode in all versions up to, and including, 4.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
RHSA-2010:0657 | Red Hat Security Advisory: gdm security and bug fix update | gdm with xdmcp ignoring tcp_wrappers on x86_64 | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-x745-x857-q9jc | SQL injection vulnerability in articlesdetails.php in ScriptsFeed and BrotherScripts (BS) Scripts Directory allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2010-2905. | [] | null | null | null | null |
|
GHSA-9835-5c9g-4pxf | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. An application may be able to read restricted memory. | [] | null | null | null | null |
|
GHSA-wmqx-7q2f-fcf6 | Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | [] | null | 7.1 | null | null |
|
CVE-2021-29077 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBW30 before 2.6.2.2, RBS40V before 2.6.2.4, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12. | [
"cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk853_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk853:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk854_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk854:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk753_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk753:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk753s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk753s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
GHSA-9x3c-69rg-65p6 | A directory traversal vulnerability in IdeaRE RefTree before 2021.09.17 allows remote authenticated users to download arbitrary .dwg files from a remote server by specifying an absolute or relative path when invoking the affected DownloadDwg endpoint. An attack uses the path field to CaddemServiceJS/CaddemService.svc/rest/DownloadDwg. | [] | null | 6.5 | null | null |
|
GHSA-v6hw-6vc6-j7hx | A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges. | [] | null | 7 | null | null |
|
GHSA-x29w-c3hm-rx69 | Authentication Bypass by Spoofing vulnerability in yonifre Maspik – Spam blacklist allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maspik – Spam blacklist: from n/a through 0.10.3. | [] | null | 5.3 | null | null |
|
CVE-2010-3133 | Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-g2h3-89xx-5947 | A denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP 2.0 requests, aka "HTTP.sys Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | [] | null | null | 7.5 | null |
|
GHSA-jmq2-75fq-cffp | rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector. | [] | null | null | null | null |
|
GHSA-6vr9-mwp7-5pjm | SQL injection vulnerability in index.php in 3CFR allows remote attackers to execute arbitrary SQL commands via the LangueID parameter. | [] | null | null | null | null |
|
CVE-2023-40394 | The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
GHSA-rmp2-65m7-997j | VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 1 of 2) via the ONVIF interface, (/onvif/device_service). | [] | null | null | 8.8 | null |
|
CVE-2018-15559 | The editor in Xiuno BBS 4.0.4 allows stored XSS. | [
"cpe:2.3:a:xiuno:xiunobbs:4.0.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2023-27615 | WordPress WP Super Minify Plugin <= 1.5.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Dipak C. Gajjar WP Super Minify plugin <= 1.5.1 versions. | [
"cpe:2.3:a:dipakgajjar:wp_super_minify:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2014-4585 | Cross-site scripting (XSS) vulnerability in the WP-FaceThumb plugin possibly 1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the ajax_url parameter to index.php. | [
"cpe:2.3:a:mnt-tech:wp-facethumb:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mnt-tech:wp-facethumb:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mnt-tech:wp-facethumb:0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-hwcv-rwgg-wfrh | A privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version 1.3.1.2 and Lenovo Diagnostics prior to version 4.45that could allow a local user to execute code with elevated privileges. | [] | null | 7.8 | null | null |
|
GHSA-cprj-g8xp-69pf | The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | [] | null | null | 5.5 | null |
|
GHSA-mv2r-q4g5-j8q5 | Denial of service in ASP.NET Core | A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData. | [] | null | null | 7.5 | null |
CVE-2013-0110 | nvSCPAPISvr.exe in the NVIDIA Stereoscopic 3D Driver service, as distributed with the NVIDIA driver before 307.78, and Release 310 before 311.00, on Windows, lacks " (double quote) characters in the service path, which allows local users to gain privileges via a Trojan horse program. | [
"cpe:2.3:a:nvidia:driver:*:-:*:*:*:windows:*:*",
"cpe:2.3:a:nvidia:driver:310.00:-:*:*:*:windows:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-32125 | 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /job. | [
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-qg4c-rjgj-mr82 | Microsoft Teams Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
Subsets and Splits