id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-g59v-xw9p-fc4r
|
The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.
|
[] | null | null | null | null |
|
CVE-2009-0268
|
Race condition in the pseudo-terminal (aka pty) driver module in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows local users to cause a denial of service (panic) via unspecified vectors related to lack of "properly sequenced code" in ptc and ptsl.
|
[
"cpe:2.3:o:sun:opensolaris:*:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:*:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-v9mj-82v8-f72w
|
MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
|
[] | null | null | null | null |
|
CVE-2007-5936
|
dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.
|
[
"cpe:2.3:a:tetex:tetex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tug:texlive_2007:*:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
CVE-2017-13829
|
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "CFNetwork" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-25v2-jc2r-qvqg
|
Data leakage in cryptographic libraries for Intel IPP before 2019 update1 release may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | null | 5.5 | null |
|
GHSA-mf79-f657-47ww
|
Insufficient Session Expiration in Admidio
|
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
|
[] | null | null | 8.2 | null |
GHSA-jw96-2pwp-84xm
|
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14902, ZDI-CAN-14866)
|
[] | null | null | null | null |
|
GHSA-qvgg-c8gm-g7p6
|
Cross-site request forgery (CSRF) vulnerability in the Cloudwords for Multilingual Drupal module before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of unspecified victims via an unknown menu callback.
|
[] | null | null | null | null |
|
GHSA-7mw5-6rmv-p5mm
|
An issue was discovered in Quest KACE Systems Management Appliance before 9.1. The script at /service/kbot_service_notsoap.php is vulnerable to unauthenticated reflected XSS when user-supplied input to the METHOD GET parameter is processed by the web application. Since the application does not properly validate and sanitize this parameter, it is possible to place arbitrary script code into the context of the same page.
|
[] | null | null | 6.1 | null |
|
CVE-2005-1597
|
Cross-site scripting (XSS) vulnerability in (1) search.php and (2) topics.php for Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlite parameter.
|
[
"cpe:2.3:a:invision_power_services:invision_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_alpha_3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_pdr3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-2233
|
Untrusted search path vulnerability in Installer of PDF Digital Signature Plugin (G2.30) and earlier, distributed till June 29, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:moj:pdf_digital_signature:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2023-25118
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the username and the password variables.
|
[
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2018-0815
|
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows 7 SP1 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0816, and CVE-2018-0817.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
CVE-2017-3274
|
Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[
"cpe:2.3:a:oracle:email_center:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
GHSA-7348-84cp-xjx4
|
Unrestricted file upload vulnerability in AspDotNetStorefront 3.3 allows remote authenticated administrators to upload arbitrary files with executable extensions via admin/images.aspx.
|
[] | null | null | null | null |
|
CVE-2019-5289
|
Gauss100 OLTP database in ManageOne with versions of 6.5.0 have an out-of-bounds read vulnerability due to the insufficient checks of the specific packet length. Attackers can construct invalid packets to attack the active and standby communication channels. Successful exploit of this vulnerability could allow the attacker to crash the database on the standby node.
|
[
"cpe:2.3:a:huawei:manageone:6.5.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-8mv3-mqmj-f8qc
|
A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36006815.
|
[] | null | null | 7.8 | null |
|
CVE-2022-22196
|
Junos OS and Junos OS Evolved: The rpd CPU spikes to 100% after a malformed ISIS TLV has been received
|
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker with an established ISIS adjacency to cause a Denial of Service (DoS). The rpd CPU spikes to 100% after a malformed ISIS TLV has been received which will lead to processing issues of routing updates and in turn traffic impact. This issue affects: Juniper Networks Junos OS 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S3-EVO; 21.2 versions prior to 21.2R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.3R1.
|
[
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-9g9q-cf56-cfh9
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to modify protected parts of the file system.
|
[] | null | 5.5 | null | null |
|
CVE-2006-6071
|
TWiki 4.0.5 and earlier, when running under Apache 1.3 using ApacheLogin with sessions and "ErrorDocument 401" redirects to a valid wiki topic, does not properly handle failed login attempts, which allows remote attackers to read arbitrary content by cancelling out of a failed authentication with a valid username and invalid password.
|
[
"cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2017-14612
|
"Shpock Boot Sale & Classifieds" app before 3.17.0 -- aka shpock-boot-sale-classifieds/id557153158 -- for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:shpock:shpock:*:*:*:*:*:iphone_os:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2020-11485
|
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contains a Cross-Site Request Forgery (CSRF) vulnerability in the AMI BMC firmware in which the web application does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request, which can lead to information disclosure or code execution.
|
[
"cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:dgx-1:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-h4rc-3vfw-rw96
|
QDOCS Smart School 7.0.0 is vulnerable to Cross Site Scripting (XSS) resulting in arbitrary code execution in admin functions related to adding or updating records.
|
[] | null | 6.1 | null | null |
|
CVE-2023-4792
|
The Duplicate Post Page Menu & Custom Post Type plugin for WordPress is vulnerable to unauthorized page and post duplication due to a missing capability check on the duplicate_ppmc_post_as_draft function in versions up to, and including, 2.3.1. This makes it possible for authenticated attackers with subscriber access or higher to duplicate posts and pages.
|
[
"cpe:2.3:a:inqsys:duplicate_post_page_menu_\\&_custom_post_type:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2023-36399
|
Windows Storage Elevation of Privilege Vulnerability
|
Windows Storage Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-q37h-r28r-j29c
|
In the Linux kernel, the following vulnerability has been resolved:usb: gadget: u_audio: don't let userspace block driver unbindIn the unbind callback for f_uac1 and f_uac2, a call to snd_card_free()
via g_audio_cleanup() will disconnect the card and then wait for all
resources to be released, which happens when the refcount falls to zero.
Since userspace can keep the refcount incremented by not closing the
relevant file descriptor, the call to unbind may block indefinitely.
This can cause a deadlock during reboot, as evidenced by the following
blocked task observed on my machine:task:reboot state:D stack:0 pid:2827 ppid:569 flags:0x0000000c
Call trace:
__switch_to+0xc8/0x140
__schedule+0x2f0/0x7c0
schedule+0x60/0xd0
schedule_timeout+0x180/0x1d4
wait_for_completion+0x78/0x180
snd_card_free+0x90/0xa0
g_audio_cleanup+0x2c/0x64
afunc_unbind+0x28/0x60
...
kernel_restart+0x4c/0xac
__do_sys_reboot+0xcc/0x1ec
__arm64_sys_reboot+0x28/0x30
invoke_syscall+0x4c/0x110
...The issue can also be observed by opening the card with arecord and
then stopping the process through the shell before unbinding:arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/nullRecording WAVE '/dev/null' : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo
^Z[1]+ Stopped arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/nullecho gadget.0 > /sys/bus/gadget/drivers/configfs-gadget/unbind(observe that the unbind command never finishes)Fix the problem by using snd_card_free_when_closed() instead, which will
still disconnect the card as desired, but defer the task of freeing the
resources to the core once userspace closes its file descriptor.
|
[] | null | null | null | null |
|
CVE-2025-30902
|
WordPress AEC Kiosque plugin <= 1.9.3 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ATL Software SRL AEC Kiosque allows Reflected XSS. This issue affects AEC Kiosque: from n/a through 1.9.3.
|
[] | null | 7.1 | null | null |
RHSA-2024:7854
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
CVE-2024-23983
|
Access rules for PingAccess may be circumvented with URL-encoded characters
|
Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules.
|
[
"cpe:2.3:a:pingidentity:pingaccess:*:*:*:*:*:*:*:*"
] | 5.8 | null | null | null |
CVE-2000-0551
|
The file transfer mechanism in Danware NetOp 6.0 does not provide authentication, which allows remote attackers to access and modify arbitrary files.
|
[
"cpe:2.3:a:danware_data:netop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:danware_data:netop:6.50:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-mvf9-xj62-qhwc
|
The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
|
[] | null | 6.5 | null | null |
|
GHSA-fj4m-gh57-2vjv
|
Config/diff.php in Basilic 1.5.14 allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameter.
|
[] | null | null | null | null |
|
GHSA-jmpx-vghf-2xp6
|
An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. The ASP.NET_Sessionid cookie is not protected by the Secure flag. This makes it prone to interception by an attacker if traffic is sent over unencrypted channels.
|
[] | null | 5.3 | null | null |
|
RHSA-2019:1234
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB19-26)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
GHSA-48m9-9cxq-75r8
|
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote authenticated users to execute arbitrary commands with root privileges via the search field.
|
[] | null | null | 8.8 | null |
|
CVE-2021-0341
|
In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-4488
|
Widgets on Pages < 1.8.0 - Contributor+ Stored XSS
|
The Widgets on Pages WordPress plugin before 1.8.0 does not validate and escape its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:widgets_on_pages_project:widgets_on_pages:*:*:*:*:*:wordpress:*:*"
] | null | 6.8 | null | null |
RHSA-2023:0272
|
Red Hat Security Advisory: Red Hat support for Spring Boot 2.7.2.SP1 security update
|
tomcat: local privilege escalation vulnerability
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7 | null | null |
GHSA-f94v-3w62-8844
|
In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.
|
[] | null | 9.8 | null | null |
|
GHSA-6483-gg6m-x7w8
|
Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
|
[] | null | null | null | null |
|
RHSA-2020:2106
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update on RHEL 6
|
keycloak: security issue on reset credential flow keycloak: problem with privacy after user logout keycloak: improper verification of certificate with host mismatch could result in information disclosure
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 5.3 | null | null |
CVE-2008-0959
|
Multiple stack-based buffer overflows in the Online Media Technologies NCTSoft NCTAudioInformation2 ActiveX control in NCTAudioInformation2.dll, as used in (1) Power Audio CD Grabber 1.0, (2) Power Audio CD Burner 1.02, (3) CinematicMP3 1.4.0.0, (4) Alive MP3 WAV Converter 3.9.3.2, and possibly other products, allow remote attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:alivemedia:alive_mp3_wav_converter:3.9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:online_media_technologies:nctaudioeditor_activex_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:online_media_technologies:nctaudiostudio_activex_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:orion_studios:cinematicmp3:1.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ussun:power_audio_cd_burner:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ussun:power_audio_cd_grabber:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2025-34300
|
Sawtooth Software Lighthouse Studio < 9.16.14 Pre-Authentication RCE
|
A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the ciwweb.pl http://ciwweb.pl/ Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
|
[] | 10 | null | null | null |
CVE-2007-2627
|
Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-25241
|
A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a sweep.
|
[
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-7f5c-frx7-m94j
|
In all Android releases from CAF using the Linux kernel, a sensitive system call was allowed to be called by HLOS.
|
[] | null | null | 5.5 | null |
|
GHSA-vw38-5mf5-hqv3
|
The gravitate-qa-tracker plugin through 1.2.1 for WordPress has PHP Object Injection.
|
[] | null | null | null | null |
|
RHSA-2020:5135
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | null | 8.8 | null |
CVE-2007-2334
|
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests.
|
[
"cpe:2.3:h:nortel:contivity:1000_vpn_switch:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:contivity:2000_vpn_switch:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:contivity:4000_vpn_switch:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_5000:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-36072
|
SilverwareGames.io used == for hashing instead of ===
|
SilverwareGames.io is a social network for users to play video games online. In version 1.1.8 and prior, due to an unobvious feature of PHP, hashes generated by built-in functions and starting with the `0e` symbols were being handled as zero multiplied with the `e` number. Therefore, the hash value was equal to 0. The maintainers fixed this in version 1.1.9 by using `===` instead of `==` in comparisons where it is possible (e.g. on sign in/sign up handlers).
|
[
"cpe:2.3:a:silverwaregames:silverwaregames:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
GHSA-j6jr-7hqv-4mp7
|
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow in the "udadmin" service that can lead to remote code execution as the root user.
|
[] | null | 9.8 | null | null |
|
GHSA-w7rc-rwvf-8q5r
|
The `size` option isn't honored after following a redirect in node-fetch
|
ImpactNode Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure.For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.PatchesWe released patched versions for both stable and beta channels:For `v2`: 2.6.1For `v3`: 3.0.0-beta.9WorkaroundsNone, it is strongly recommended to update as soon as possible.For more informationIf you have any questions or comments about this advisory:Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+)Contact one of the core maintainers.
|
[] | null | 2.6 | null | null |
CVE-2020-8596
|
participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).
|
[
"cpe:2.3:a:xnau:participants_database:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | 6 |
|
GHSA-jrgj-hh7m-7w4f
|
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
|
[] | null | 7 | null | null |
|
GHSA-q2gf-gx38-vggj
|
The Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom JS extension in all versions up to, and including, 2.0.8.2 due to insufficient capability restriction, and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-h824-5q6w-q27x
|
PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
|
[] | null | null | 8.3 | null |
|
GHSA-wqcq-mggq-ggvw
|
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
|
[] | null | null | 7.5 | null |
|
CVE-2017-12999
|
The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
RHSA-2023:4475
|
Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements
|
openshift: OCP & FIPS mode
|
[
"cpe:/a:redhat:acm:2.7::el8"
] | null | 6.5 | null | null |
GHSA-v9gv-mwp4-wx7g
|
An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.The remedy is: upgrade to the patched 5.2.1 version.We would like to thank Volodymyr Ilyin for bringing this issue to our attention.
|
[] | null | 7.5 | null | null |
|
GHSA-xcxc-7x26-f9p5
|
Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the payload in a visitor browser.
|
[] | null | null | 6.1 | null |
|
GHSA-97m8-w6vw-mqfp
|
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view export (export.php) because proper filtration is omitted.
|
[] | null | null | 6.1 | null |
|
GHSA-73ww-8w9m-69vc
|
An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31748056. References: MT-ALPS02961400.
|
[] | null | null | 7 | null |
|
GHSA-8ph5-wgc5-5jj9
|
A hardware vulnerability in GPU memory modules allows attackers to accelerate micro-architectural attacks through the use of the JavaScript WebGL API.
|
[] | null | null | 4.8 | null |
|
CVE-2022-24610
|
Settings/network settings/wireless settings on the Alecto DVC-215IP camera version 63.1.1.173 and below shows the Wi-Fi passphrase hidden, but by editing/removing the style of the password field the password becomes visible which grants access to an internal network connected to the camera.
|
[
"cpe:2.3:o:alecto:dvc-215ip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:alecto:dvc-215ip:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | 5 |
|
CVE-2021-43989
|
mySCADA myPRO
|
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.
|
[
"cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHSA-2017:1363
|
Red Hat Security Advisory: Red Hat Directory Server 9 - 15 Day Retirement Notice
|
This is the 15 day notification for the retirement of Red Hat Directory Server 9.
|
[
"cpe:/a:redhat:directory_server:9"
] | null | null | null | null |
CVE-2024-32079
|
WordPress Advanced iFrame plugin <= 2024.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Dempfle Advanced iFrame allows Stored XSS.This issue affects Advanced iFrame: from n/a through 2024.2.
|
[] | null | 6.5 | null | null |
GHSA-h89x-p6mf-35px
|
Race condition in the Remote Procedure Call kernel module (rpcmod) in Sun Solaris 8 through 10 allows local users to cause a denial of service (NULL dereference and panic) via unspecified vectors.
|
[] | null | null | null | null |
|
GHSA-4g26-v2fv-8g5f
|
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
|
[] | null | null | null | null |
|
GHSA-7467-mrw5-4gpj
|
The SDK for the MediaPlaybackController module has improper permission verification. Successful exploitation of this vulnerability may affect confidentiality.
|
[] | null | 7.5 | null | null |
|
CVE-2018-12846
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-r89h-7xqr-h8wg
|
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null |
|
CVE-2001-1168
|
Directory traversal vulnerability in index.php in PhpMyExplorer before 1.2.1 allows remote attackers to read arbitrary files via a ..%2F (modified dot dot) in the chemin parameter.
|
[
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_classic:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyexplorer:phpmyexplorer_multiuser:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-2781
|
The Avatar upload feature in FUD Forum before 2.7.0 does not properly verify uploaded files, which allows remote attackers to execute arbitrary PHP code via a file with a .php extension that contains image data followed by PHP code.
|
[
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ilia_alshanetsky:fudforum:2.7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hq7p-j377-6v63
|
SQL Injection Vulnerability via ActiveRecord comments
|
There is a possible vulnerability in ActiveRecord related to the sanitization of comments. This vulnerability has been assigned the CVE identifier CVE-2023-22794.Versions Affected: >= 6.0.0 Not affected: < 6.0.0 Fixed Versions: 6.0.6.1, 6.1.7.1, 7.0.4.1
ImpactPreviously the implementation of escaping for comments was insufficient forIf malicious user input is passed to either the annotate query method, the optimizer_hints query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database with insufficient sanitization and be able to inject SQL outside of the comment.In most cases these interfaces won’t be used with user input and users should avoid doing so.Example vulnerable code:Example vulnerable QueryLogs configuration (the default configuration is not vulnerable):All users running an affected release should either upgrade or use one of the workarounds immediately.
ReleasesThe FIXED releases are available at the normal locations.
WorkaroundsAvoid passing user input to annotate and avoid using QueryLogs configuration which can include user input.
PatchesTo aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
|
[] | null | 8.8 | null | null |
CVE-2021-2219
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: SQR). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
GHSA-3prp-hmjp-8qm4
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
[] | null | 9.6 | null | null |
|
CVE-2021-32157
|
A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.
|
[
"cpe:2.3:a:webmin:webmin:1.973:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 |
|
GHSA-fpxx-jv2f-8cf9
|
ColdFusion version 2021 update 1 (and earlier) and versions 2018.10 (and earlier) are impacted by an Use of Inherently Dangerous Function vulnerability that can lead to a security feature bypass??. An authenticated attacker could leverage this vulnerability to access and manipulate arbitrary data on the environment.
|
[] | null | 7.4 | null | null |
|
CVE-2022-36402
|
There is an int overflow vulnerability in vmwgfx driver
|
An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-72m8-2j54-r5xg
|
inc.login.php in PHPsFTPd 0.2 through 0.4 allows remote attackers to obtain the administrator's username and password by setting the do_login parameter and performing an edit action using user.php, which causes the login check to be bypassed and leaks the password in the response.
|
[] | null | null | null | null |
|
GHSA-2wrh-hm5q-2h33
|
A Cross-Site Request Forgery (CSRF) in Guanzhou Tozed Kangwei Intelligent Technology ZLTS10G software version S10G_3.11.6 allows attackers to takeover user accounts via sending a crafted POST request to /goform/goform_set_cmd_process.
|
[] | null | 8.8 | null | null |
|
RHSA-2024:1940
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2024-48540
|
Incorrect access control in XIAO HE Smart 4.3.1 allows attackers to access sensitive information by analyzing the code and data within the APK file.
|
[
"cpe:2.3:o:shenzhen_xiaohe_lejia_technology_co:xiaohesmart_firmware:4.3.1:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
CVE-2018-11641
|
Use of Hard-coded Credentials in /var/www/xms/application/controllers/gatherLogs.php in the administrative console in Dialogic PowerMedia XMS through 3.5 allows remote attackers to interact with a web service.
|
[
"cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2017-2609
|
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-g37q-h7cj-3qc4
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getIcon method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6016.
|
[] | null | null | 8.8 | null |
|
CVE-2020-7493
|
A CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability exists in EcoStruxure Operator Terminal Expert 3.1 Service Pack 1 and prior (formerly known as Vijeo XD) which could cause malicious code execution when opening the project file.
|
[
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:sp1:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-m25j-crjh-x2hf
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline plugin <= 2.5 versions.
|
[] | null | 5.9 | null | null |
|
CVE-2015-1897
|
Stack-based buffer overflow in the FastBackMount process in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.11.1 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1898.
|
[
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-f2q5-6mx7-q9qq
|
Browsershot Local File Inclusion
|
Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files.**Note:**This is a bypass of the fix for [CVE-2024-21549](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533023).
|
[] | 6.6 | 8.6 | null | null |
CVE-2023-31582
|
jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less.
|
[
"cpe:2.3:a:jose4j_project:jose4j:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-g9jc-92w4-hqr8
|
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24699.
|
[] | null | null | 7.8 | null |
|
GHSA-6wcf-5xfc-f4pv
|
Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality via unknown vectors related to Load Testing for Web Apps, a different vulnerability than CVE-2016-0477 and CVE-2016-0478. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the DownloadServlet servlet, which allows remote attackers to read arbitrary files via directory traversal sequences in the reportName parameter.
|
[] | null | null | null | null |
|
cisco-sa-ap-assoc-dos-D2SunWK2
|
Cisco Access Point Software Association Request Denial of Service Vulnerability
|
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 7.4 | null | null |
GHSA-2m58-j4rw-6qj5
|
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
|
[] | null | null | null | null |
|
CVE-2013-5496
|
Open Network Environment Platform (ONEP) in Cisco NX-OS allows remote authenticated users to cause a denial of service (network-element reload) via a crafted packet, aka Bug ID CSCui51551.
|
[
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*"
] | null | null | null | 6.3 |
|
CVE-2024-21140
|
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:java_se:8u411:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:8u411-perf:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:11.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:17.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:21.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:22.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:21.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:22.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:20.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:21.3.10:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.