id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2006-1761 | Cross-site scripting vulnerability in index.php in blur6ex 0.3.452 allows remote attackers to inject arbitrary web script or HTML via the errormsg parameter, which is not sanitized in the error message. NOTE: the vector in the shard parameter is not XSS and has been assigned a separate name. | [
"cpe:2.3:a:blursoft:blur6ex:0.3.462:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-56mp-522g-cw9g | An IDOR exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) that allowed a project owner or maintainer to see the members of any private group via merge request approval rules. | [] | null | null | null | null |
|
GHSA-cjgr-h69p-cj83 | Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9. | [] | null | 4.7 | null | null |
|
CVE-2017-7984 | In Joomla! 3.2.0 through 3.6.5 (fixed in 3.7.0), inadequate filtering leads to XSS in the template manager component. | [
"cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-hwhh-xm47-jghm | In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage
collection confirm race"), `cpu` and `jiffies32` were introduced to
the struct nf_conncount_tuple.The commit made nf_conncount_add() initialize `conn->cpu` and
`conn->jiffies32` when allocating the struct.
In contrast, count_tree() was not changed to initialize them.By commit 34848d5c896e ("netfilter: nf_conncount: Split insert and
traversal"), count_tree() was split and the relevant allocation
code now resides in insert_tree().
Initialize `conn->cpu` and `conn->jiffies32` in insert_tree().BUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]
BUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143
find_or_evict net/netfilter/nf_conncount.c:117 [inline]
__nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143
count_tree net/netfilter/nf_conncount.c:438 [inline]
nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521
connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72
__nft_match_eval net/netfilter/nft_compat.c:403 [inline]
nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433
expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288
nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663
NF_HOOK_LIST include/linux/netfilter.h:350 [inline]
ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633
ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669
__netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]
__netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983
__netif_receive_skb_list net/core/dev.c:6035 [inline]
netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126
netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178
xdp_recv_frames net/bpf/test_run.c:280 [inline]
xdp_test_run_batch net/bpf/test_run.c:361 [inline]
bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390
bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316
bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407
__sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813
__do_sys_bpf kernel/bpf/syscall.c:5902 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5900 [inline]
__ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900
ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358
do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
__do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387
do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412
do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450
entry_SYSENTER_compat_after_hwframe+0x84/0x8eUninit was created at:
slab_post_alloc_hook mm/slub.c:4121 [inline]
slab_alloc_node mm/slub.c:4164 [inline]
kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171
insert_tree net/netfilter/nf_conncount.c:372 [inline]
count_tree net/netfilter/nf_conncount.c:450 [inline]
nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521
connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72
__nft_match_eval net/netfilter/nft_compat.c:403 [inline]
nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433
expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288
nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663
NF_HOOK_LIST include/linux/netfilter.h:350 [inline]
ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633
ip_list_rcv+0x9ef/0xa40 net/ip
---truncated--- | [] | null | 5.5 | null | null |
|
CVE-2011-3848 | Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25. | [
"cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-38069 | In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases | [
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2024-43267 | WordPress Mega Addons For Elementor plugin <= 1.9 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qamar Sheeraz, Nasir Ahmad, GenialSouls Mega Addons For Elementor allows Stored XSS.This issue affects Mega Addons For Elementor: from n/a through 1.9. | [] | null | 6.5 | null | null |
RHSA-2015:0865 | Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 40 Day End Of Life Notice | This is the 40 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite Proxy 5:
* Red Hat Satellite Proxy 5.2
* Red Hat Satellite Proxy 5.3
* Red Hat Satellite Proxy 5.4
* Red Hat Satellite Proxy 5.5 | [
"cpe:/a:redhat:network_proxy:5.2::el5",
"cpe:/a:redhat:network_proxy:5.3::el5",
"cpe:/a:redhat:network_proxy:5.4::el5",
"cpe:/a:redhat:network_proxy:5.4::el6",
"cpe:/a:redhat:network_proxy:5.5::el5",
"cpe:/a:redhat:network_proxy:5.5::el6"
] | null | null | null | null |
CVE-2024-28195 | Cross-Site Request Forgery (CSRF) vulnerability in API and login in your_spotify | your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify versions < 1.9.0 do not protect the API and login flow against Cross-Site Request Forgery (CSRF). Attackers can use this to execute CSRF attacks on victims, allowing them to retrieve, modify or delete data on the affected YourSpotify instance. Using repeated CSRF attacks, it is also possible to create a new user on the victim instance and promote the new user to instance administrator if a legitimate administrator visits a website prepared by an attacker. Note: Real-world exploitability of this vulnerability depends on the browser version and browser settings in use by the victim. This issue has been addressed in version 1.9.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-55vh-84h5-w3p4 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247. | [] | null | null | 3.5 | null |
|
CVE-2019-20091 | An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp. | [
"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-4mjx-2gh5-ph8h | Exposure of sensitive Slack webhook URLs in debug logs and traces | ImpactDebug logs expose sensitive URLs for Slack webhooks that contain private information.PatchesThe problem is fixed in v1.3.2 which redacts sensitive URLs for webhooks.WorkaroundsDisabling/filtering debug logs in case you use Slack webhooks using tracing log level and filters.Referenceshttps://github.com/abdolence/slack-morphism-rust/releases/tag/v1.3.2For more informationIf you have any questions or comments about this advisory:Open an issue in [repo](https://github.com/abdolence/slack-morphism-rust)Read our [security policy](https://github.com/abdolence/slack-morphism-rust/blob/master/SECURITY.md) | [] | null | 7.5 | null | null |
CVE-2024-4948 | Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-7hwg-r28w-246w | The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via RSVP name field in all versions up to, and including, 6.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
|
GHSA-pjxj-j84h-598j | Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/view_visit.php:4 | [] | null | 8.8 | null | null |
|
CVE-2019-0281 | SAPUI5 and OpenUI5, before versions 1.38.39, 1.44.39, 1.52.25, 1.60.6 and 1.63.0, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:openui5:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-0464 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via vectors related to WLS-Console. | [
"cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.1.3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-r3xh-r3g8-x9xh | Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | 3.3 | null | null |
|
GHSA-f2gj-wfwj-gh3q | The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print(). | [] | null | null | 9.8 | null |
|
CVE-2017-8021 | EMC Elastic Cloud Storage (ECS) before 3.1 is affected by an undocumented account vulnerability that could potentially be leveraged by malicious users to compromise the affected system. | [
"cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2002-0496 | The HTTP server for SouthWest Talker server 1.0.0 allows remote attackers to cause a denial of service (server crash) via a malformed URL to port 5002. | [
"cpe:2.3:a:southwest:southwest:1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2002:215 | Red Hat Security Advisory: : Updated fetchmail packages fix vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
GHSA-fgqv-x4rv-8256 | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31963, CVE-2021-31966. | [] | null | 7.1 | null | null |
|
CVE-2014-7330 | The XtendCU Mobile (aka com.metova.cuae.xtend) application 1.0.28 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:xtendcu:xtendcu_mobile:1.0.28:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-p2gx-4434-pf6g | Apache InLong: Logged-in user could exploit an arbitrary file read vulnerability | Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers canuse the specific payload to read from an arbitrary file. Users are advised to upgrade to Apache InLong's 1.11.0 or cherry-pick [1] to solve it.[1] https://github.com/apache/inlong/pull/9673 | [] | 9.3 | 9.1 | null | null |
GHSA-3h97-vcg5-xxqv | Adobe RoboHelp version 2015.0.3 and earlier, RoboHelp 11 and earlier have an input validation issue that could be used in cross-site scripting attacks. | [] | null | null | 6.1 | null |
|
GHSA-x9q2-fff7-3xq5 | A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The name of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability. | [] | null | 6.1 | null | null |
|
GHSA-q2pr-ffxw-p47h | Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access. | [] | null | 5.5 | null | null |
|
GHSA-qvm4-wwp9-8xp8 | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9,0 could allow a remote attacker to traverse directories on the file system. An attacker could send a specially-crafted URL request to view arbitrary files on the system but not content. IBM X-Force ID: 163226. | [] | null | 4.3 | null | null |
|
GHSA-3c2r-59vj-vq75 | An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34197514. References: B-RB#112600. | [] | null | null | 7 | null |
|
CVE-1999-0909 | Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability. | [
"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:0b:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-vghf-6629-65jw | The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet. | [] | null | null | null | null |
|
GHSA-37r5-v3hg-cg4r | A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections. | [] | null | 6.4 | null | null |
|
CVE-2007-1525 | Direct static code injection vulnerability in postpost.php in Dayfox Blog (dfblog) 4 allows remote attackers to execute arbitrary PHP code via the cat parameter, which can be executed via a request to posts.php. | [
"cpe:2.3:a:dayfox_designs:dayfox_blog:4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-1999-1324 | VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing. | [
"cpe:2.3:o:hp:openvms_vax:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-6f6x-vfc5-5gwm | The read_header function in libavcodec/ffv1dec.c in FFmpeg 2.4 and 3.3.4 and possibly earlier allows remote attackers to have unspecified impact via a crafted MP4 file, which triggers an out-of-bounds read. | [] | null | null | 8.8 | null |
|
CVE-2006-0652 | WHMCompleteSolution (WHMCS) before 2.3 assigns incorrect permissions to "resellers", which allows remote authenticated users to perform privileged actions or obtain sensitive information. NOTE: this report is based on a vendor bug report that identified "incorrect permissions." However, the vendor did not label it a security issue, and there was no statement regarding whether or not the permissions were actually more permissive than intended. If in fact the permissions were more restrictive than intended, then this would be a functional problem but not a vulnerability. | [
"cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.2:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-2355-vxmg-gjx2 | Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access. | [] | null | null | null | null |
|
GHSA-vp32-rg8f-2jxg | A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. Affected releases are openSUSE Open Build Service: versions prior to d6244245dda5367767efc989446fe4b5e4609cce. | [] | null | null | 7.5 | null |
|
CVE-2021-26075 | The Jira importers plugin AttachTemporaryFile rest resource in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before 8.13.4, and from version 8.14.0 before 8.15.1 allowed remote authenticated attackers to obtain the full path of the Jira application data directory via an information disclosure vulnerability in the error message when presented with an invalid filename. | [
"cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2020-15255 | CSV injection in Anuko Time Tracker | In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325. | [
"cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:*"
] | null | 8.7 | null | null |
GHSA-54cv-wj74-27xr | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-xm9g-8m49-7qpg | Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.0.4, 12.0.5, 12.0.6, 12.1.1, 12.1.2, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors related to List of Values. | [] | null | null | null | null |
|
RHSA-2019:3520 | Red Hat Security Advisory: python3 security and bug fix update | python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.4 | null |
CVE-2008-6802 | Multiple SQL injection vulnerabilities in index.php in phPhotoGallery 0.92 allow remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password fields. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:phpexplorer:phphotogallery:0.92:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-40128 | In several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2022:1301 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
CVE-2025-27346 | WordPress Rebuild Permalinks Plugin <= 1.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gerrygooner Rebuild Permalinks allows Reflected XSS. This issue affects Rebuild Permalinks: from n/a through 1.6. | [] | null | 7.1 | null | null |
CVE-2005-0090 | A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash). | [
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2006-2340 | Cross-site scripting (XSS) vulnerability in PassMasterFlex and PassMasterFlexPlus (PassMasterFlex+) 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) password, or (3) User-Agent HTTP header in the Hack Log. | [
"cpe:2.3:a:lethal_penguin:passmasterflex:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lethal_penguin:passmasterflexplus:1.2:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2018-8968 | An issue was discovered in zzcms 8.2. user/manage.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg or oldflv parameter in an action=modify request. This can be leveraged for database access by deleting install.lock. | [
"cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 6.4 |
|
CVE-2007-5736 | Unrestricted file upload vulnerability in upload.php in SeeBlick 1.0 Beta allows remote attackers to upload arbitrary files via unspecified vectors. NOTE: these files are stored with .html extensions, so the scope of the attack might be limited to resource consumption and possibly XSS. | [
"cpe:2.3:a:seeblick:seeblick:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2007-2902 | SQL injection vulnerability in main/auth/my_progress.php in Dokeos 1.8.0 and earlier allows remote authenticated users to execute arbitrary SQL commands via the course parameter. | [
"cpe:2.3:a:dokeos:dokeos:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-9599 | Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php. | [
"cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-21829 | Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520. | [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-8f8g-9j73-7p82 | steal vulnerable to Prototype Pollution via optionName variable | Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js. | [] | null | 9.8 | null | null |
CVE-2016-10228 | The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-5xf3-qpv9-5x44 | Maid Hiring Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/search-booking-request.php. | [] | null | 6.1 | null | null |
|
CVE-2024-32690 | WordPress RSS Feed Widget plugin <= 2.9.7 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood RSS Feed Widget allows Stored XSS.This issue affects RSS Feed Widget: from n/a through 2.9.7.
| [] | null | 5.9 | null | null |
GHSA-vhrf-gfcg-4676 | Due to improper authorization check, business users who are using Israeli File from SHAAM program (/ATL/VQ23 transaction), are granted more than needed authorization to perform certain transaction, which may lead to users getting access to data that would otherwise be restricted. | [] | null | 6.5 | null | null |
|
RHSA-2022:9111 | Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update | go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
CVE-2018-17555 | The web component on ARRIS TG2492LG-NA 061213 devices allows remote attackers to obtain sensitive information via the /snmpGet oids parameter. | [
"cpe:2.3:o:commscope:arris_tg2492lg-na_firmware:061213:*:*:*:*:*:*:*",
"cpe:2.3:h:commscope:arris_tg2492lg-na:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2002-1077 | IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field. | [
"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-20731 | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000v2 before 1.0.0.74, D8500 before 1.0.3.39, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.22, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150v1 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, R6250 before 1.0.4.20, R6300v2 before 1.0.4.18, R6400v2 before 1.0.2.52, R6700 before 1.0.1.44, R6900 before 1.0.1.46, R7000 before 1.0.9.26, R6900P before 1.3.0.20, R7000P before 1.3.0.20, R7100LG before 1.0.0.34, R7300DST before 1.0.0.62, R8000 before 1.0.4.12, R7900P before 1.3.0.10, R8000P before 1.3.0.10, R8300 before 1.0.2.116, R8500 before 1.0.2.116, WN2500RPv2 before 1.0.1.54, and WNDR3400v3 before 1.0.1.18. | [
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6150:v1:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn2500rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn2500rp:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*"
] | null | null | 5.6 | null |
|
CVE-2019-14937 | REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data. | [
"cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6 |
|
CVE-2025-2222 | CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak
information and potential privilege escalation following man in the middle attack. | [] | 8.2 | 7.8 | null | null |
|
CVE-2020-27936 | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A local user may be able to cause unexpected system termination or read kernel memory. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | 6.6 |
|
CVE-2019-2488 | Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Session Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.8:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-8fh8-56w4-443q | The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages. | [] | null | null | null | null |
|
GHSA-583g-g682-crxf | Micronaut management endpoints vulnerable to drive-by localhost attack | SummaryEnabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought.DetailsA malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are ["simple"](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests) and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered.ImpactProduction environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development. | [] | null | 5.1 | null | null |
GHSA-j6rf-xjcr-vrqj | Improper buffer restrictions in system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access. | [] | null | null | null | null |
|
CVE-2024-43523 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
CVE-2020-13943 | If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. | [
"cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.48:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.49:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.5.57:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2020-8171 | We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:There are certain end-points containing functionalities that are vulnerable to command injection. It is possible to craft an input string that passes the filter check but still contains commands, resulting in remote code execution.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page. | [
"cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-2g16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-2g20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-5g23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-5g27:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ar:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ar-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm2-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm2hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm5-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm5hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:is-m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:lbem5-23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:litestation_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-2g18:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-5g22:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-5g25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m2-13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m5-16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m5-19:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m2-400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-300-iso:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-400-iso:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:picom2hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:power_ap_n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:rm2-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:rm5-ti:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-x2vw-xfxf-2fwh | Buffer overflow in libavcodec/dca.c in FFmpeg 0.4.9 before r14917, as used by MPlayer, allows context-dependent attackers to have an unknown impact via vectors related to an incorrect DCA_MAX_FRAME_SIZE value. | [] | null | null | null | null |
|
GHSA-mqfg-r4mp-f7xf | Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character. | [] | null | null | null | null |
|
CVE-2021-29627 | In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free. | [
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2020-5894 | On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out. | [
"cpe:2.3:a:f5:nginx_controller:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.8 |
|
GHSA-8w4w-f5fh-qf9q | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hive Support Hive Support – WordPress Help Desk allows SQL Injection.This issue affects Hive Support – WordPress Help Desk: from n/a through 1.1.2. | [] | null | 8.5 | null | null |
|
GHSA-gfpr-4fpp-g5qm | Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows attackers to cause a denial of service via crafted xwd file. | [] | null | 6.5 | null | null |
|
CVE-2016-9904 | An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2020-21641 | Out-of-Band XML External Entity (OOB-XXE) vulnerability in Zoho ManageEngine Analytics Plus before 4.3.5 allows remote attackers to read arbitrary files, enumerate folders and scan internal ports via crafted XML license file. | [
"cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-29367 | blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data. | [
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a5:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta5:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
GHSA-q5cc-q49p-jfrj | Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions. | [] | null | null | null | null |
|
CVE-2014-6101 | Cross-site scripting (XSS) vulnerability in the redirect-login feature in IBM Business Process Manager (BPM) Advanced 7.5 through 8.5.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-r9w6-rhh9-7v53 | Incorrect Authorization in HashiCorp Consul | HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3. | [] | null | 5.3 | null | null |
GHSA-r3w4-36x6-7r99 | Duplicate Advisory: Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459 | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-r95h-9x8f-r3f7. This link is maintained to preserve external references.Original DescriptionSummaryNokogiri v1.16.5 upgrades its dependency libxml2 to
[2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) from 2.12.6.libxml2 v2.12.7 addresses CVE-2024-34459:described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/720patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53ImpactThere is no impact to Nokogiri users because the issue is present only
in libxml2's `xmllint` tool which Nokogiri does not provide or expose.Timeline2024-05-13 05:57 EDT, libxml2 2.12.7 release is announced2024-05-13 08:30 EDT, nokogiri maintainers begin triage2024-05-13 10:05 EDT, nokogiri [v1.16.5 is released](https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5)
and this GHSA made public | [] | null | null | null | null |
GHSA-7j63-969g-r2jp | The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named "passster" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked. | [] | null | 5.9 | null | null |
|
CVE-2023-51502 | WordPress WooCommerce Stripe Payment Gateway Plugin <= 7.6.1 is vulnerable to Insecure Direct Object References (IDOR) | Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1.
| [
"cpe:2.3:a:woocommerce:woocommerce_stripe_payment_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:automattic:woocommerce_stripe:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null |
GHSA-9qrw-j2qh-47hj | Huawei E355s Mobile WiFi with firmware before 22.158.45.02.625 and WEBUI before 13.100.04.01.625 allows remote attackers to obtain sensitive configuration information by sniffing the network or sending unspecified commands. | [] | null | null | null | null |
|
CVE-2022-31157 | Use of a Broken or Risky Cryptographic Algorithm in packbackbooks/lti-1-3-php-library | LTI 1.3 Tool Library is a library used for building IMS-certified LTI 1.3 tool providers in PHP. Prior to version 5.0, the function used to generate random nonces was not sufficiently cryptographically complex. Users should upgrade to version 5.0 to receive a patch. There are currently no known workarounds. | [
"cpe:2.3:a:packback:lti_1.3_tool_library:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-v2w7-xjpq-rmv5 | A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload. | [] | null | null | null | null |
|
GHSA-44wx-pxp5-fjxm | An issue was discovered on Samsung mobile devices with software through 2016-09-13 (Exynos AP chipsets). There is a memcpy heap-based buffer overflow in the OTP service. The Samsung ID is SVE-2016-7114 (December 2016). | [] | null | null | null | null |
|
GHSA-5vjc-qx43-r747 | Stored Cross-site Scripting in folder-auth plugin | Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646 | [] | null | null | null | null |
CVE-2012-2155 | Cross-site request forgery (CSRF) vulnerability in the CDN2 Video module 6.x for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:kyle_browning:cdn2_video:6.x-1.x:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-cjvq-xvv5-f922 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.0.0.49893. A specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | [] | null | 8.8 | null | null |
|
GHSA-wwc5-p8v7-jw92 | Multiple endpoints in `oracle-sidecar` in versions 0.347.0 to 0.543.0 were found to be vulnerable to SQL injections. | [] | null | 6.8 | null | null |
|
GHSA-ffm9-v534-h8c2 | The Registrations for the Events Calendar WordPress plugin before 2.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 6.1 | null | null |
|
GHSA-876v-7v7c-4xcf | LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text']. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.