id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2004-1274
|
The DownloadLoop function in main.c for greed 0.81p allows remote attackers to execute arbitrary code via a GRX file containing a filename with shell metacharacters.
|
[
"cpe:2.3:a:greed:greed:0.81p:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-599h-6j66-vpc4
|
Opera 9.52 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 10.00 Beta 3 Build 1699 is also affected.
|
[] | null | null | null | null | null |
|
CVE-2016-9272
|
A Blind SQL Injection Vulnerability in Exponent CMS through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.
|
[
"cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 6.4 | null |
|
CVE-2014-3973
|
Multiple SQL injection vulnerabilities in FrontAccounting (FA) before 2.3.21 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:frontaccounting:frontaccounting:*:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3:rc:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:frontaccounting:frontaccounting:2.3.19:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2008-6822
|
Unrestricted file upload vulnerability in uploadp.php in New Earth Programming Team (NEPT) imgupload (aka Image Uploader) 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and a modified content type, then accessing this file via a direct request, as demonstrated by an upload with an image/jpeg content type. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:newearthpt:imgupload:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-ph3w-2843-72mx
|
Stored Cross-site Scripting in gitea
|
Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9 via unfiltered pdfs
|
[] | null | null | 4.4 | null | null |
CVE-2021-3474
|
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
|
[
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-98r4-cjrq-q7qh
|
Directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
[] | null | null | null | null | null |
|
RHSA-2024:0807
|
Red Hat Security Advisory: dotnet6.0 security update
|
dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null | null |
GHSA-8rr6-29c9-2mpq
|
Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Calliope.This issue affects Calliope: from n/a through 1.0.33.
|
[] | null | 4.3 | null | null | null |
|
CVE-2015-7767
|
Buffer overflow in Konica Minolta FTP Utility 1.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long USER command.
|
[
"cpe:2.3:a:konicaminolta:ftp_utility:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-fqw9-5rf7-p2x8
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
ICSA-19-106-03
|
PLC Cycle Time Influences (Update A)
|
Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets.CVE-2019-10953 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
GHSA-q96x-24cf-mf7c
|
The Hero Maps Premium plugin 2.2.1 and prior for WordPress is prone to unauthenticated XSS via the views/dashboard/index.php p parameter because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to inject HTML or arbitrary JavaScript within the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based tokens or to launch other attacks.
|
[] | null | null | null | null | null |
|
CVE-2021-26387
|
Insufficient access controls in ASP kernel may allow a
privileged attacker with access to AMD signing keys and the BIOS menu or UEFI
shell to map DRAM regions in protected areas, potentially leading to a loss of platform integrity.
|
[] | null | 3.9 | null | null | null |
|
CVE-2024-43113
|
The contextual menu for links could provide an opportunity for cross-site scripting attacks This vulnerability affects Firefox for iOS < 129.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2012-4411
|
The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.
|
[
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2013-6454
|
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via a -o-link attribute.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-5617
|
The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kitfox:svg_salamander:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | 5.8 | null |
|
GHSA-qh3h-3m3c-wrh8
|
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169.
|
[] | null | 6.2 | null | null | null |
|
GHSA-6x9j-jwjr-5cq4
|
Foxit PDF Reader XFA Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21601.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xpph-g64w-p4mm
|
Cross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | 6.1 | null | null |
|
GHSA-8q44-g323-pv3g
|
Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper handling within an http-equiv="refresh" META element.
|
[] | null | null | null | null | null |
|
GHSA-f79r-cx48-9744
|
Multiple SQL injection vulnerabilities in /admin/cgi-bin/rpc/doReport/18 in McAfee Email Gateway 7.6 allow remote authenticated users to execute arbitrary SQL commands via the (1) events_col, (2) event_id, (3) reason, (4) events_order, (5) emailstatus_order, or (6) emailstatus_col JSON keys.
|
[] | null | null | null | null | null |
|
GHSA-f6mp-2jrx-cmh3
|
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
|
[] | null | 5.5 | null | null | null |
|
GHSA-fvm2-fqg3-334j
|
A lock screen issue was addressed with improved state management. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. A person with physical access to a device may be able to use Siri to access private calendar information.
|
[] | null | 5.5 | null | null | null |
|
GHSA-346h-749j-r28w
|
PHPECC vulnerable to multiple cryptographic side-channel attacks
|
ECDSA CanonicalizationPHPECC is vulnerable to malleable ECDSA signature attacks.Constant-Time SignerWhen generating a new ECDSA signature, the GMPMath adapter was used. This class wraps the GNU Multiple Precision arithmetic library (GMP), which does not aim to provide constant-time implementations of algorithms.An attacker capable of triggering many signatures and studying the time it takes to perform each operation would be able to leak the secret number, `k`, and thereby learn the private key.EcDH Timing LeaksWhen calculating a shared secret using the `EcDH` class, the scalar-point multiplication is based on the arithmetic defined by the `Point` class.Even though the library implements a Montgomery ladder, the `add()`, `mul()`, and `getDouble()` methods on the `Point` class are not constant-time. This means that your ECDH private keys are leaking information about each bit of your private key through a timing side-channel.
|
[] | null | 9.1 | null | null | null |
CVE-2024-26925
|
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
|
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
within the same GC sequence.
nf_tables_module_autoload() temporarily releases the mutex to load
module dependencies, then it goes back to replay the transaction again.
Move it at the end of the abort phase after nft_gc_seq_end() is called.
|
[] | null | null | null | null | null |
GHSA-294x-cxhp-6h86
|
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer handler where a NULL pointer dereference caused by invalid user input may lead to denial of service or potential escalation of privileges.
|
[] | null | null | 7.8 | null | null |
|
CVE-2007-3149
|
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."
|
[
"cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2024-0739
|
Hecheng Leadshop leadshop.php deserialization
|
A vulnerability, which was classified as critical, was found in Hecheng Leadshop up to 1.4.20. Affected is an unknown function of the file /web/leadshop.php. The manipulation of the argument install leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251562 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:leadshop:leadshop:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 | null |
GHSA-4622-4xxq-396h
|
Multiple SQL injection vulnerabilities in admin/login.asp in E. Z. Poll 2 allow remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-996h-76rq-ffwq
|
D-LINK DIR-859 A1 1.05 and A1 1.06B01 Beta01 was discovered to contain a command injection vulnerability via the lxmldbc_system function at /htdocs/cgibin.
|
[] | null | 9.8 | null | null | null |
|
PYSEC-2021-849
| null |
The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.
|
[] | null | null | null | null | null |
GHSA-x8m3-7hm7-vhmr
|
Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote attackers to obtain login access via a request to hosting/addreseller.asp with a username in the reseller parameter, followed by a request to AdminSettings/displays.asp with the DecideAction and ChangeSkin parameters.
|
[] | null | null | null | null | null |
|
CVE-2010-1607
|
Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
[
"cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-22681
|
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
|
[
"cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_5000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:studio_5000_logix_designer:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_1768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_1769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:drivelogix_1794-l34:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:drivelogix_5560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:drivelogix_5730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:softlogix_5800:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-m23c-995x-54xh
|
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing a maliciously crafted video file may lead to unexpected app termination.
|
[] | null | 5.5 | null | null | null |
|
CVE-2013-4613
|
The default configuration of the administrative interface on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers does not require authentication, which allows remote attackers to modify the configuration by visiting the Advanced page. NOTE: the vendor has apparently responded by stating "for user convenience, the default setting does not require a password. However, if a user has a particular concern about third parties accessing the user's home printer, the default setting can be changed to add a password."
|
[
"cpe:2.3:h:canon:mg3100_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mg5300_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mg6100_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mp340_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mp495_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mx870_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mx890_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mx920_printer:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mx922_printer:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-hr8p-76q8-fxwq
|
XXE vulnerability in Jenkins Performance Plugin
|
Jenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.This allows attackers able to control workspace contents to have Jenkins parse a crafted XML report file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.As of publication of this advisory, there is no fix.
|
[] | null | 6.5 | null | null | null |
CVE-2021-36168
|
A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET request with malicious parameter values.
|
[
"cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2008-2714
|
Opera before 9.26 allows remote attackers to misrepresent web page addresses using "certain characters" that "cause the page address text to be misplaced."
|
[
"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vqjh-65h8-v6p9
|
A vulnerability in the web-based management interface of Cisco Industrial Network Director could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious, customized link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device via a web browser and with the privileges of the user.
|
[] | null | null | 8.8 | null | null |
|
CVE-2007-2886
|
Unspecified vulnerability in the Nortel CS 1000 M media card in Enterprise VoIP-Core-CS 1000E, 1000M, and 1000S 04.50W before 20070523 in Meridian/CS 1000 allows remote attackers to cause a denial of service (card hang) via unspecified vectors.
|
[
"cpe:2.3:a:nortel:communications_server:1000e:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000m:*:cabinet_chassi:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000m:*:half_group:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000m:*:multi_group:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000m:*:single_group:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000s:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-hvrc-p628-rmrc
|
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.
|
[] | null | 4.7 | null | null | null |
|
CVE-2024-11100
|
1000 Projects Beauty Parlour Management System index.php sql injection
|
A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:1000projects:beauty_parlour_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-288r-5pxq-4qgx
|
While processing the USB StrSerialDescriptor array, an array index out of bounds can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.
|
[] | null | null | 7.8 | null | null |
|
CVE-2020-25817
|
SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]).
|
[
"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:silverstripe:silverstripe:4.6.0:rc1:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-6586-wxp2-vw2f
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[] | null | null | null | null | null |
|
GHSA-rpc8-p8rc-75gr
|
An untrusted search path (aka DLL Preloading) vulnerability in the Cisco Immunet antimalware installer could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability. Cisco Bug IDs: CSCvf23928.
|
[] | null | null | 6.7 | null | null |
|
CVE-2019-15527
|
An issue was discovered on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the MaxIdTime field to SetWanSettings.
|
[
"cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
CVE-2023-40154
|
Incorrect default permissions in the Intel(R) SUR for Gameplay Software before version 2.0.1901 may allow privillaged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:system_usage_report:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-rr7m-4h79-q5qx
|
Deserialization of Untrusted Data vulnerability in Chimpstudio FoodBakery allows Object Injection.This issue affects FoodBakery: from n/a through 3.3.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2024:7818
|
Red Hat Security Advisory: containernetworking-plugins security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2024-25594
|
WordPress MyWaze Plugin <= 1.6 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Savvy Wordpress Development MyWaze allows Stored XSS.This issue affects MyWaze: from n/a through 1.6.
|
[] | null | 6.5 | null | null | null |
GHSA-wcc2-hgw8-8prx
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetlicensecfg function.
|
[] | null | null | null | null | null |
|
GHSA-j73g-qx54-ph6j
|
The DNS Proxy in Palo Alto Networks PAN-OS before 6.1.18, 7.x before 7.0.16, 7.1.x before 7.1.11, and 8.x before 8.0.3 allows remote attackers to execute arbitrary code via a crafted domain name.
|
[] | null | null | 9.8 | null | null |
|
CVE-2017-17311
|
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a DoS vulnerability in the IPSEC IKEv1 implementations of Huawei Firewall products. Due to improper handling of the malformed messages, an attacker may sent crafted packets to the affected device to exploit these vulnerabilities. Successful exploit the vulnerability could lead to device deny of service.
|
[
"cpe:2.3:o:huawei:usg2205bsr_firmware:v300r001c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg2205bsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg2220bsr_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg2220bsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg5120bsr_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg5120bsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg5150bsr_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg5150bsr:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2016-1274
|
Juniper Junos OS 14.1X53 before 14.1X53-D30 on QFX Series switches allows remote attackers to cause a denial of service (PFE panic) via a high rate of unspecified VXLAN packets.
|
[
"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2018-0310
|
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to obtain sensitive information from memory or cause a denial of service (DoS) condition on the affected product. The vulnerability exists because the affected software insufficiently validates header values in Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overread condition, which could allow the attacker to obtain sensitive information from memory or cause a DoS condition on the affected product. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd69957, CSCve02435, CSCve04859, CSCve41536, CSCve41538, CSCve41559.
|
[
"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)hsk\\(0.357\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0.2\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.8\\(0.1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.8\\(3.5\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_c36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2148t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2224tp_ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232pp_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232tm-e_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232tm_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248pq_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp_ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:3.1\\(3a\\)a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.9\\(0.902\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-p975-8w9q-fcjr
|
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'.
|
[] | null | null | null | null | null |
|
GHSA-2q6v-32mr-8p8x
|
Null Byte Injection in Plug.Static
|
Plug.Static is used for serving static assets, and is vulnerable to null
byte injection. If file upload functionality is provided, this can allow
users to bypass filetype restrictions.
We recommend all applications that provide file upload functionality and
serve those uploaded files locally with Plug.Static to upgrade immediately
or include the fix below. If uploaded files are rather stored and served
from S3 or any other cloud storage, you are not affected.
|
[] | null | 7.8 | null | null | null |
CVE-2013-0005
|
The WCF Replace function in the Open Data (aka OData) protocol implementation in Microsoft .NET Framework 3.5, 3.5 SP1, 3.5.1, and 4, and the Management OData IIS Extension on Windows Server 2012, allows remote attackers to cause a denial of service (resource consumption and daemon restart) via crafted values in HTTP requests, aka "Replace Denial of Service Vulnerability."
|
[
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:sp2:professional:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:-:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:-:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:management_odata_iis_extension:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2025-7022
|
My Reservation System <= 2.3 - Reflected XSS
|
The My Reservation System WordPress plugin through 2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] | null | 6.1 | null | null | null |
GHSA-6wp5-2wg9-x2pr
|
Stack-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-xpf5-rhc4-rvvh
|
A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273648.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2019-25140
|
The WordPress Coming Soon Page & Maintenance Mode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the logo_width, logo_height, rcsp_logo_url, home_sec_link_txt, rcsp_headline and rcsp_description parameters in versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:wpshopmart:coming_soon_page_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2016-6182
|
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6181, CVE-2016-6183, and CVE-2016-6184.
|
[
"cpe:2.3:o:huawei:honor_4c_firmware:chm-tl00c01_b535:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_4c_firmware:chm-tl00c01b556:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_4c_firmware:chm-tl00hc00_b535:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_4c_firmware:chm-tl00hc00b556:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_4c_firmware:chm-ul00c00b535:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_4c_firmware:chm-ul00c00b556:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_4c:-:*:*:*:*:*:*:*"
] | null | null | 7 | 9.3 | null |
|
CVE-2023-24880
|
Windows SmartScreen Security Feature Bypass Vulnerability
|
Windows SmartScreen Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
GHSA-wc83-j7mg-m426
|
Cross-site scripting (XSS) vulnerability in IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 allows remote authenticated users to inject arbitrary web script or HTML by uploading a file.
|
[] | null | null | null | null | null |
|
CVE-2024-12922
|
Altair <= 5.2.4 - Unauthenticated Arbitrary Options Update via pp_import_current
|
The Altair theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check within functions.php in all versions up to, and including, 5.2.4. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
|
[] | null | 9.8 | null | null | null |
CVE-2019-17345
|
An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.9 | null |
|
GHSA-qvw5-2pqf-3wgv
|
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
|
[] | null | null | 5.5 | null | null |
|
CVE-2025-50585
|
StudentManage v1.0 was discovered to contain a SQL injection vulnerability via the component /admin/adminStudentUrl.
|
[] | null | 8.8 | null | null | null |
|
GHSA-pw83-8wqr-6w84
|
An unauthenticated user could log into iSTAR Ultra, iSTAR Ultra LT, iSTAR Ultra G2, and iSTAR Edge G2 with administrator rights.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-2674
|
Improper Access Control in openemr/openemr
|
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-797f-63wg-8chv
|
An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior.The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-7895
|
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-r863-653f-pw4g
|
Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."
|
[] | null | null | null | null | null |
|
GHSA-wwf3-3r88-2q8v
|
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.1.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2024:0198
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null | null |
CVE-2024-53166
|
block, bfq: fix bfqq uaf in bfq_limit_depth()
|
In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix bfqq uaf in bfq_limit_depth()
Set new allocated bfqq to bic or remove freed bfqq from bic are both
protected by bfqd->lock, however bfq_limit_depth() is deferencing bfqq
from bic without the lock, this can lead to UAF if the io_context is
shared by multiple tasks.
For example, test bfq with io_uring can trigger following UAF in v6.6:
==================================================================
BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50
Call Trace:
<TASK>
dump_stack_lvl+0x47/0x80
print_address_description.constprop.0+0x66/0x300
print_report+0x3e/0x70
kasan_report+0xb4/0xf0
bfqq_group+0x15/0x50
bfqq_request_over_limit+0x130/0x9a0
bfq_limit_depth+0x1b5/0x480
__blk_mq_alloc_requests+0x2b5/0xa00
blk_mq_get_new_requests+0x11d/0x1d0
blk_mq_submit_bio+0x286/0xb00
submit_bio_noacct_nocheck+0x331/0x400
__block_write_full_folio+0x3d0/0x640
writepage_cb+0x3b/0xc0
write_cache_pages+0x254/0x6c0
write_cache_pages+0x254/0x6c0
do_writepages+0x192/0x310
filemap_fdatawrite_wbc+0x95/0xc0
__filemap_fdatawrite_range+0x99/0xd0
filemap_write_and_wait_range.part.0+0x4d/0xa0
blkdev_read_iter+0xef/0x1e0
io_read+0x1b6/0x8a0
io_issue_sqe+0x87/0x300
io_wq_submit_work+0xeb/0x390
io_worker_handle_work+0x24d/0x550
io_wq_worker+0x27f/0x6c0
ret_from_fork_asm+0x1b/0x30
</TASK>
Allocated by task 808602:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
__kasan_slab_alloc+0x83/0x90
kmem_cache_alloc_node+0x1b1/0x6d0
bfq_get_queue+0x138/0xfa0
bfq_get_bfqq_handle_split+0xe3/0x2c0
bfq_init_rq+0x196/0xbb0
bfq_insert_request.isra.0+0xb5/0x480
bfq_insert_requests+0x156/0x180
blk_mq_insert_request+0x15d/0x440
blk_mq_submit_bio+0x8a4/0xb00
submit_bio_noacct_nocheck+0x331/0x400
__blkdev_direct_IO_async+0x2dd/0x330
blkdev_write_iter+0x39a/0x450
io_write+0x22a/0x840
io_issue_sqe+0x87/0x300
io_wq_submit_work+0xeb/0x390
io_worker_handle_work+0x24d/0x550
io_wq_worker+0x27f/0x6c0
ret_from_fork+0x2d/0x50
ret_from_fork_asm+0x1b/0x30
Freed by task 808589:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
kasan_save_free_info+0x27/0x40
__kasan_slab_free+0x126/0x1b0
kmem_cache_free+0x10c/0x750
bfq_put_queue+0x2dd/0x770
__bfq_insert_request.isra.0+0x155/0x7a0
bfq_insert_request.isra.0+0x122/0x480
bfq_insert_requests+0x156/0x180
blk_mq_dispatch_plug_list+0x528/0x7e0
blk_mq_flush_plug_list.part.0+0xe5/0x590
__blk_flush_plug+0x3b/0x90
blk_finish_plug+0x40/0x60
do_writepages+0x19d/0x310
filemap_fdatawrite_wbc+0x95/0xc0
__filemap_fdatawrite_range+0x99/0xd0
filemap_write_and_wait_range.part.0+0x4d/0xa0
blkdev_read_iter+0xef/0x1e0
io_read+0x1b6/0x8a0
io_issue_sqe+0x87/0x300
io_wq_submit_work+0xeb/0x390
io_worker_handle_work+0x24d/0x550
io_wq_worker+0x27f/0x6c0
ret_from_fork+0x2d/0x50
ret_from_fork_asm+0x1b/0x30
Fix the problem by protecting bic_to_bfqq() with bfqd->lock.
|
[] | null | 7.8 | null | null | null |
GHSA-h4v2-3mqv-x2ww
|
The mintToken function of a smart contract implementation for C3 Token (C3), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
GHSA-2wm7-744x-3ghp
|
Buffer overflow in Uptime Client (UpClient) 5.0b7, and possibly other versions, allows local users to gain privileges via a long -p argument.
|
[] | null | null | null | null | null |
|
GHSA-g66q-8cf5-g99m
|
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected.
|
[] | 6.9 | 7.3 | null | null | null |
|
RHSA-2024:11485
|
Red Hat Security Advisory: kernel security update
|
kernel: gro: fix ownership transfer
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null | null |
CVE-2002-2113
|
search.cgi in AGH HTMLsearch 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the template parameter.
|
[
"cpe:2.3:a:agh:htmlsearch:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-27505
|
Reflected cross site scripting (XSS)
|
[
"cpe:2.3:o:citrix:sd-wan_110_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_210_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_400_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_410_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_4000_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_4100_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:premium:*:*:*",
"cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:standard:*:*:*",
"cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-r25f-29pp-6hcv
|
The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[] | null | null | null | null | null |
|
CVE-2017-11739
|
In Zoho ManageEngine Application Manager 13.1 Build 13100, an authenticated user, with administrative privileges, has the ability to add a widget on any dashboard. This widget can be a "Utility Widget" with a "Custom HTML or Text" field. Once this widget is created, it will be loaded on the dashboard where it was added. An attacker can abuse this functionality by creating a "Utility Widget" that contains malicious JavaScript code, aka XSS.
|
[
"cpe:2.3:a:zohocorp:manageengine_applications_manager:13.1:13100:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2025-1757
|
WordPress Portfolio Builder – Portfolio Gallery <= 1.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
|
The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-v2x9-3r93-p6r4
|
A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229281 was assigned to this vulnerability.
|
[] | null | null | 6.3 | null | null |
|
GHSA-v8mv-whpr-g2g8
|
The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
|
[] | null | null | 5.5 | null | null |
|
GHSA-59c3-pmvg-hgmm
|
Improper sanitization of incoming intent in SecSettings prior to SMR MAY-2021 Release 1 allows local attackers to get permissions to access system uid data.
|
[] | null | null | null | null | null |
|
GHSA-j26m-mhw3-8vc7
|
Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have an user interface injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
[] | null | null | null | null | null |
|
GHSA-gjhp-q42m-324x
|
An issue was discovered in EMC ScaleIO versions before 2.0.1.1. Incorrect permissions on the SCINI driver may allow a low-privileged local attacker to modify the configuration and render the ScaleIO Data Client (SDC) server unavailable.
|
[] | null | null | 5.5 | null | null |
|
CVE-2022-21693
|
Path traversal in Onionshare
|
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.
|
[
"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-24wp-35x7-5hx9
|
The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.
|
[] | null | null | null | null | null |
|
GHSA-w646-j359-7q63
|
SQL injection vulnerability in house/listing_view.php in phpCollegeExchange 0.1.5c allows remote attackers to execute arbitrary SQL commands via the itemnr parameter.
|
[] | null | null | null | null | null |
|
GHSA-rv27-q7pp-jv9w
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
|
[] | null | null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.