id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-7f2w-w6q2-vgj3
|
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
|
[] | null | 6.5 | null | null | null |
|
CVE-2017-9481
|
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain unintended access to the Network Processor (NP) 169.254/16 IP network by adding a routing-table entry that specifies the LAN IP address as the router for that network.
|
[
"cpe:2.3:o:cisco:dpc3939_firmware:dpc3939-p20-18-v303r20421746-170221a-cmcst:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:dpc3939:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2021-0522
|
In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2017-12924
|
CDirVector::GetTable in dirfunc.hxx in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted fpx image.
|
[
"cpe:2.3:a:libfpx_project:libfpx:1.3.1:p6:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2016-7798
|
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
|
[
"cpe:2.3:a:ruby-lang:openssl:*:*:*:*:*:ruby:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-xq77-398p-x2hj
|
The “The Plus Addons for Elementor Page Builder Lite� WordPress Plugin before 2.0.6 has four widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
|
[] | null | null | null | null | null |
|
RHBA-2024:6202
|
Red Hat Bug Fix Advisory: linux-firmware bug fix update
|
hw: amd: SMM Lock Bypass
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null | null |
RHSA-2024:2776
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.13 packages and security update
|
jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null | null |
GHSA-4mjh-9fxc-hm78
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Reflected XSS. This issue affects Data Dash: from n/a through 1.2.3.
|
[] | null | 7.1 | null | null | null |
|
GHSA-3wx2-wvxf-xw45
|
SQL injection vulnerability in soporte_horizontal_w.php in PHP Webquest 2.6 allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter, a different vector than CVE-2007-4920.
|
[] | null | null | null | null | null |
|
GHSA-hmmc-xfpm-h6x3
|
Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.
|
[] | null | null | null | null | null |
|
CVE-2016-10155
|
Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 6 | null | 4.9 | null |
|
CVE-2005-0503
|
uim before 0.4.5.1 trusts certain environment variables when libUIM is used in setuid or setgid applications, which allows local users to gain privileges.
|
[
"cpe:2.3:a:uim:uim:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-x3mv-x599-m8pw
|
Nagios XI before version 5.11.3 was discovered to contain a SQL injection vulnerability via the bulk modification tool.
|
[] | null | 9.8 | null | null | null |
|
GHSA-p265-xr98-3vmr
|
Incorrect Authorization in Jenkins
|
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.
|
[] | null | null | 4.3 | null | null |
CVE-2023-42467
|
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-jpmg-8f7f-j8pq
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16. An app may be able to execute arbitrary code with kernel privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2008-2820
|
Directory traversal vulnerability in lang/lang-system.php in Open Azimyt CMS 0.22 minimal and 0.21 stable allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
|
[
"cpe:2.3:a:azimyt:open_azimyt_cms:0.21_stable:*:*:*:*:*:*:*",
"cpe:2.3:a:azimyt:open_azimyt_cms:0.22_minimal:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-mg2f-7p87-hxwv
|
A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.
|
[] | null | null | null | null | null |
|
CVE-2023-34304
|
Ashlar-Vellum Cobalt Out-Of-Bounds Access Remote Code Execution Vulnerability
|
Ashlar-Vellum Cobalt Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of IGS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-18006.
|
[
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2025-23883
|
WordPress Stray Random Quotes Plugin <= 1.9.9 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Stray Random Quotes allows Reflected XSS. This issue affects Stray Random Quotes: from n/a through 1.9.9.
|
[] | null | 7.1 | null | null | null |
CVE-2004-0208
|
The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-f9rj-grmf-4hrc
|
An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
|
[] | null | null | 9.1 | null | null |
|
CVE-2024-12484
|
Codezips Technical Discussion Forum signuppost.php sql injection
|
A vulnerability classified as critical was found in Codezips Technical Discussion Forum 1.0. This vulnerability affects unknown code of the file /signuppost.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[
"cpe:2.3:a:codezips:technical_discussion_forum:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-10723
|
Stored XSS in phpipam/phpipam
|
A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0.
|
[] | null | null | 3.5 | null | null |
CVE-2011-0311
|
The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.
|
[
"cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.8.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-25pf-65p9-qghp
|
Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-f9j7-2567-jg9h
|
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).
|
[] | null | 6.7 | null | null | null |
|
GHSA-wrjq-6j55-j564
|
The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-21597
|
Dell Wyse ThinOS, version 9.0, contains a Sensitive Information Disclosure Vulnerability. An authenticated malicious user with physical access to the system could exploit this vulnerability to read sensitive information written to the log files.
|
[
"cpe:2.3:o:dell:wyse_thinos:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_thinos:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_thinos:9.1:mr1:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_5470_thin_client:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-xvcc-h99r-vm8p
|
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
|
[] | null | null | null | null | null |
|
CVE-2023-26203
|
A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands.
|
[
"cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-8g86-97w6-2547
|
The 'Find Phone' function in Nice smartphones with software versions earlier before Nice-AL00C00B0135 has an authentication bypass vulnerability. An unauthenticated attacker may wipe and factory reset the phone by special steps. Due to missing authentication of the 'Find Phone' function, an attacker may exploit the vulnerability to bypass the 'Find Phone' function in order to use the phone normally.
|
[] | null | null | 4.6 | null | null |
|
CVE-2009-4894
|
Multiple cross-site scripting (XSS) vulnerabilities in profile.php in PunBB before 1.3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) password or (2) e-mail.
|
[
"cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:beta1a:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.3.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-30843
|
Room-rent-portal-site v1.0 is vulnerable to SQL Injection via /rrps/classes/Master.php?f=delete_category, id.
|
[
"cpe:2.3:a:room_rent_portal_site_project:room_rent_portal_site:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2024-10353
|
SourceCodester Online Exam System admin-dashboard access control
|
A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. Affected is an unknown function of the file /admin-dashboard. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This affects a different product and is a different issue than CVE-2024-40480.
|
[
"cpe:2.3:a:oretnom23:online_exam_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-q5h7-2qmh-rxhr
|
A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API.
|
[] | null | 7.5 | null | null | null |
|
CVE-2014-1586
|
content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2025-6876
|
SourceCodester Best Salon Management System add-category.php sql injection
|
A vulnerability was found in SourceCodester Best Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /panel/add-category.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2017-13322
|
In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | 10 | null | null | null | null |
|
CVE-2021-30108
|
Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.
|
[
"cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2024-9908
|
D-Link DIR-619L B1 formSetMACFilter buffer overflow
|
A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formSetMACFilter of the file /goform/formSetMACFilter. The manipulation of the argument curTime leads to buffer overflow. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*"
] | 5.1 | 5.5 | 5.5 | 5.2 | null |
CVE-2019-2298
|
Protection is missing while accessing md sessions info via macro which can lead to use-after-free in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDM660, SDX20, SDX24
|
[
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
GHSA-cx95-q6gx-w4qp
|
SAK-50571 Sakai Kernel users created with type roleview can login as a normal user
|
ImpactIllegal access can be granted to the system.Referencessee https://sakaiproject.atlassian.net/browse/SAK-50571
|
[] | 8.7 | 0 | null | null | null |
RHSA-2016:1605
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
|
nodejs-negotiator: Regular expression denial-of-service nodejs-minimatch: Regular expression denial-of-service
|
[
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | 5.3 | null | null |
CVE-2023-42838
|
An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
CVE-2025-30372
|
Emlog Pro contains an SQL injection vulnerability.
|
Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue.
|
[] | 7.7 | null | null | null | null |
CVE-2011-3105
|
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-38443
|
Adobe Dimension GLB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Dimension versions 3.4.5 is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-rm24-r627-m4hc
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H).
|
[] | null | 5.5 | null | null | null |
|
GHSA-vqq2-52wh-vqj8
|
An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2005:275
|
Red Hat Security Advisory: ia32el security update
|
security flaw
|
[
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null | null |
CVE-2007-6204
|
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.
|
[
"cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-51903
|
WordPress WP Listings Pro plugin <= 3.0.14 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imFORZA WP Listings Pro allows Stored XSS.This issue affects WP Listings Pro: from n/a through 3.0.14.
|
[] | null | 6.5 | null | null | null |
CVE-2024-45328
|
An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.
|
[] | null | 7.1 | null | null | null |
|
GHSA-69wg-j2xh-f235
|
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Worklist). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | 7.5 | null | null | null |
|
GHSA-mq5p-7q76-276p
|
In the Linux kernel, the following vulnerability has been resolved:net: let net.core.dev_weight always be non-zeroThe following problem was encountered during stability test:(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \
returned 1, exceeding its budget of 0.
------------[ cut here ]------------
list_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \
next=ffff88905f746e40.
WARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \
__list_add_valid_or_report+0xf3/0x130
CPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+
RIP: 0010:__list_add_valid_or_report+0xf3/0x130
Call Trace:
? __warn+0xcd/0x250
? __list_add_valid_or_report+0xf3/0x130
enqueue_to_backlog+0x923/0x1070
netif_rx_internal+0x92/0x2b0
__netif_rx+0x15/0x170
loopback_xmit+0x2ef/0x450
dev_hard_start_xmit+0x103/0x490
__dev_queue_xmit+0xeac/0x1950
ip_finish_output2+0x6cc/0x1620
ip_output+0x161/0x270
ip_push_pending_frames+0x155/0x1a0
raw_sendmsg+0xe13/0x1550
__sys_sendto+0x3bf/0x4e0
__x64_sys_sendto+0xdc/0x1b0
do_syscall_64+0x5b/0x170
entry_SYSCALL_64_after_hwframe+0x76/0x7eThe reproduction command is as follows:
sysctl -w net.core.dev_weight=0
ping 127.0.0.1This is because when the napi's weight is set to 0, process_backlog() may
return 0 and clear the NAPI_STATE_SCHED bit of napi->state, causing this
napi to be re-polled in net_rx_action() until __do_softirq() times out.
Since the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can
be retriggered in enqueue_to_backlog(), causing this issue.Making the napi's weight always non-zero solves this problem.Triggering this issue requires system-wide admin (setting is
not namespaced).
|
[] | null | null | null | null | null |
|
CVE-2019-6708
|
PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter.
|
[
"cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
GHSA-f8jx-5r24-p453
|
Inappropriate implementation in PictureInPicture in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 4.3 | null | null | null |
|
GHSA-7hc8-j4c9-mf24
|
Unspecified vulnerability in the SQL Performance Advisories/UIs component in Oracle Database Server 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Oracle Enterprise Manager Grid Control 10.1.0.6, 10.2.0.5, and 11.1.0.1; allows remote attackers to affect confidentiality, integrity, and availability, related to SQL Details UI & Explain Plan.
|
[] | null | null | null | null | null |
|
CVE-2008-0352
|
The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2022-25514
|
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
|
[
"cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-q597-3v27-cmvx
|
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an xwrite out-of-bounds read.
|
[] | null | 6.5 | null | null | null |
|
GHSA-7p54-g429-c636
|
A heap-based buffer overflow exists in the AP4_CttsAtom::AP4_CttsAtom component located in /Core/Ap4Utils.h of Bento4 version 06c39d9. This can lead to a denial of service (DOS).
|
[] | null | null | null | null | null |
|
GHSA-w8q3-pxrq-r5fg
|
SQL injection vulnerability in keyword_search_action.php in Vastal I-Tech Shaadi Zone 1.0.9 allows remote attackers to execute arbitrary SQL commands via the tage parameter.
|
[] | null | null | null | null | null |
|
GHSA-79pm-w7jm-jv2r
|
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.
|
[] | null | null | null | null | null |
|
CVE-2018-7434
|
zzcms 8.2 allows remote attackers to discover the full path via a direct request to 3/qq_connect2.0/API/class/ErrorCase.class.php or 3/ucenter_api/code/friend.php.
|
[
"cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2022-4539
|
Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass
|
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
|
[
"cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
CVE-2022-31065
|
Cross site scripting vulnerability for private chat in bigbluebutton
|
BigBlueButton is an open source web conferencing system. In affected versions an attacker can embed malicious JS in their username and have it executed on the victim's client. When a user receives a private chat from the attacker (whose username contains malicious JavaScript), the script gets executed. Additionally when the victim receives a notification that the attacker has left the session. This issue has been patched in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.3:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.4:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-3712
|
Potential user privilege escalation
|
Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.
Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).
|
[
"cpe:2.3:o:honeywell:pm43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:pm43:-:*:*:*:*:*:x86:*"
] | null | 6.6 | null | null | null |
CVE-2021-23432
|
Prototype Pollution
|
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
|
[
"cpe:2.3:a:mootools_project:mootools:*:*:*:*:*:node.js:*:*"
] | null | 5.4 | null | null | null |
GHSA-6x72-2h6h-rcwq
|
The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null | null |
|
GHSA-jjcj-5hm4-fh8v
|
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2381.
|
[] | null | null | null | null | null |
|
GHSA-fmrc-w6m3-5hv4
|
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: dbg-tlv: ensure NUL terminationThe iwl_fw_ini_debug_info_tlv is used as a string, so we must
ensure the string is terminated correctly before using it.
|
[] | null | 9.1 | null | null | null |
|
RHSA-2021:1030
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.3 | null | null | null |
CVE-2025-0353
|
Divi Torque Lite <= 4.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets
|
The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-gh63-grcf-3799
|
A vulnerability in the web interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability affects the following Cisco products running Cisco IMC Software: Unified Computing System (UCS) B-Series M3 and M4 Blade Servers, Unified Computing System (UCS) C-Series M3 and M4 Rack Servers. More Information: CSCvc37931. Known Affected Releases: 3.1(2c)B.
|
[] | null | null | 6.1 | null | null |
|
CVE-2025-30811
|
WordPress ValidateCertify plugin <= 1.6.1 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Javier Revilla ValidateCertify allows Cross Site Request Forgery. This issue affects ValidateCertify: from n/a through 1.6.1.
|
[] | null | 4.3 | null | null | null |
CVE-2025-30940
|
WordPress Melipayamak <= 2.2.12 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in melipayamak Melipayamak allows Stored XSS. This issue affects Melipayamak: from n/a through 2.2.12.
|
[] | null | 5.9 | null | null | null |
GHSA-4776-frm5-r3rr
|
A vulnerability in the received packet parser of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) software could allow an unauthenticated, remote attacker to cause a reload of the affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient size validation of user-supplied data. An attacker could exploit this vulnerability by sending crafted H.224 data in Real-Time Transport Protocol (RTP) packets in an H.323 call. An exploit could allow the attacker to overflow a buffer in a cache that belongs to the received packet parser, which will result in a crash of the application, resulting in a DoS condition. All versions of Cisco Expressway Series Software and Cisco TelePresence VCS Software prior to version X8.8.2 are vulnerable. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCus99263.
|
[] | null | null | 8.6 | null | null |
|
CVE-2024-49647
|
WordPress Simple Custom Admin plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Carl Alberto Simple Custom Admin allows Reflected XSS.This issue affects Simple Custom Admin: from n/a through 1.2.
|
[] | null | 7.1 | null | null | null |
GHSA-w7r3-cc9h-pg34
|
Accellion Secure File Transfer Appliance before 8_0_105 allows remote authenticated administrators to bypass the restricted shell and execute arbitrary commands via shell metacharacters to the ping command, as demonstrated by modifying the cli program.
|
[] | null | null | null | null | null |
|
GHSA-h3jg-w72m-c86w
|
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-ffm8-j238-56p4
|
FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnerable to Cross Site Scripting (XSS) in the Time Range Configuration functionality of the administration interface. An attacker can inject malicious JavaScript into the "Time Range Name" field, which is improperly sanitized. When this input is saved, it is later executed in the browser of any user accessing the affected page, including administrators, resulting in arbitrary script execution in the user's browser.
|
[] | null | 7.1 | null | null | null |
|
GHSA-q877-62m4-8x64
|
The FTP service in Zaurus PDAs SL-5000D and SL-5500 does not require authentication, which allows remote attackers to access the file system as root.
|
[] | null | null | null | null | null |
|
GHSA-jggq-92ww-7r4w
|
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
|
[] | null | null | 9.8 | null | null |
|
GHSA-m574-9366-9235
|
Substance3D - Viewer versions 0.25 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
GHSA-p4vm-8rvv-j5fx
|
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
|
[] | null | 8.8 | null | null | null |
|
CVE-2014-4629
|
EMC Documentum Content Server 7.0, 7.1 before 7.1 P10, and 6.7 before SP2 P19 allows remote authenticated users to read or delete arbitrary files via unspecified vectors related to an insecure direct object reference.
|
[
"cpe:2.3:a:emc:documentum_content_server:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2010-1701
|
SQL injection vulnerability in browse.html in PHP Video Battle Script allows remote attackers to execute arbitrary SQL commands via the cat parameter.
|
[
"cpe:2.3:a:rocky.nu:php_video_battle_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-46478
|
HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681.
|
[
"cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-16299
|
A Division by Zero vulnerability in bj10v_print_page() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
[
"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2023-2409
|
SourceCodester AC Repair and Services System view_service.php sql injection
|
A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. This affects an unknown part of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227703.
|
[
"cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-2w4f-8m3p-jrxr
|
A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
|
[] | null | 6.1 | null | null | null |
|
CVE-2011-3452
|
Internet Sharing in Apple Mac OS X before 10.7.3 does not preserve the Wi-Fi configuration across software updates, which allows remote attackers to obtain sensitive information by leveraging the lack of a WEP password for a Wi-Fi network.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-25595
|
ASUS RT-AC86U - Improper Input Validation
|
ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.
|
[
"cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.45956:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2024-33870
|
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
|
[] | null | 6.3 | null | null | null |
|
GHSA-3ch5-6956-fx84
|
freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file.
|
[] | null | null | null | null | null |
|
RHSA-2022:0265
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null | null |
GHSA-32ww-65cv-cvf4
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-11907.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.