id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-21829
|
A heap-based buffer overflow vulnerability exists in the XML Decompression EnumerationUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
CVE-2024-43391
|
Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices
|
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
|
[
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
RHSA-2024:8969
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
|
ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging ansible-core: Ansible-core user may read/write unauthorized content
|
[
"cpe:/a:redhat:ansible_automation_platform:ee::el8",
"cpe:/a:redhat:ansible_automation_platform:ee::el9"
] | null | 6.3 | null | null |
CVE-2024-25074
|
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference).
|
[] | null | 5.9 | null | null |
|
CVE-2023-24956
|
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.
|
[
"cpe:2.3:a:forget_heart_message_box_project:forget_heart_message_box:1.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-gwhh-28wm-q9vf
|
SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10.
|
[] | null | 7.5 | null | null |
|
GHSA-9mpf-9xm9-9826
|
The mintToken function of a smart contract implementation for SpeedCashLite (SCSL), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | 7.5 | null | null |
|
CVE-2013-6796
|
The SMTP server in DeepOfix 3.3 and earlier allows remote attackers to bypass authentication via an empty password, which triggers an LDAP anonymous bind.
|
[
"cpe:2.3:a:deeproot_linux:deepofix:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2022:0777
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: tcp: fix page frag corruption on page fault kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: missing check in ioctl allows kernel memory read/write kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7 | null | null |
CVE-2023-42009
|
IBM InfoSphere Information Server cross-site scripting
|
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 265504.
|
[
"cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:on_cloud:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-2w84-9xxr-7qr9
|
A Read-Only User Effect Change vulnerability in the Policy Builder interface of Cisco Policy Suite could allow an authenticated, remote attacker to make policy changes in the Policy Builder interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by accessing the Policy Builder interface and modifying an HTTP request. A successful exploit could allow the attacker to make changes to existing policies. Cisco Bug IDs: CSCvi35007.
|
[] | null | null | 6.5 | null |
|
CVE-2015-5173
|
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
|
[
"cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-hppr-6qxj-jhgx
|
In phpMyFaq before 2.9.9, there is CSRF in admin/ajax.config.php.
|
[] | null | null | 8.8 | null |
|
GHSA-r66x-78gw-39v4
|
CodeAvalanche Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CADirectory.mdb. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null |
|
GHSA-cqhq-5mcx-c3m9
|
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module, Topologylnstance module, Routing module.
|
[] | null | 5.5 | null | null |
|
RHSA-2025:8252
|
Red Hat Security Advisory: libsoup security update
|
libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup libsoup: Denial of Service attack to websocket server libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.4 | null | null |
CVE-2024-27778
|
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 4.4.0 through 4.4.4, 4.2.0 through 4.2.6 and below 4.0.4 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
|
[] | null | 8.3 | null | null |
|
CVE-2025-27207
|
Adobe Commerce | Improper Access Control (CWE-284)
|
Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction.
|
[] | null | 6.5 | null | null |
GHSA-8r7j-pj39-v7xh
|
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.0 and 9.3.0.2, including 8.3.x display the target path on host when a file is uploaded with an invalid character in its name.
|
[] | null | 4.3 | null | null |
|
CVE-2021-4048
|
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
|
[
"cpe:2.3:a:lapack_project:lapack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openblas_project:openblas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:*:*:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:1.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:1.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:1.7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:1.7.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:julialang:julia:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_storage:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
GHSA-2849-xmf3-cv2h
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with system privileges.
|
[] | null | null | null | null |
|
CVE-2023-38064
|
In JetBrains TeamCity before 2023.05.1 build chain parameters of the "password" type could be written to the agent log
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2015-1548
|
mini_httpd 1.21 and earlier allows remote attackers to obtain sensitive information from process memory via an HTTP request with a long protocol string, which triggers an incorrect response size calculation and an out-of-bounds read.
|
[
"cpe:2.3:a:acme:mini_httpd:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-1789
|
Flyspray 0.9.9 allows remote attackers to obtain sensitive information (private project summaries) via direct requests.
|
[
"cpe:2.3:a:flyspray:flyspray:0.9.9:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2019-14294
|
An issue was discovered in Xpdf 4.01.01. There is a use-after-free in the function JPXStream::fillReadBuf at JPXStream.cc, due to an out of bounds read.
|
[
"cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2015-1272
|
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-46478
|
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
|
[
"cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-4h97-gx53-pcm9
|
The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Persistent XSS via the chat widget/page message form.
|
[] | null | null | null | null |
|
CVE-2019-18676
|
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
|
[
"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
] | null | 7.5 | null | 5 |
|
cisco-sa-3000-9000-fileaction-QtLzDRy2
|
Cisco NX-OS Software Unauthenticated Arbitrary File Actions Vulnerability
|
A vulnerability in the implementation of an internal file management service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode that are running Cisco NX-OS Software could allow an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files with root privileges on the device.
This vulnerability exists because TCP port 9075 is incorrectly configured to listen and respond to external connection requests. An attacker could exploit this vulnerability by sending crafted TCP packets to an IP address that is configured on a local interface on TCP port 9075. A successful exploit could allow the attacker to create, delete, or overwrite arbitrary files, including sensitive files that are related to the device configuration. For example, the attacker could add a user account without the device administrator knowing.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74414"].
|
[] | null | 9.8 | null | null |
GHSA-pphf-qgjw-p8w7
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Fix btnxpuart_closeFix scheduling while atomic BUG in btnxpuart_close(), properly
purge the transmit queue and free the receive skb.[ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002
...
[ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1
[ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT)
[ 10.980760] Workqueue: hci0 hci_power_off [bluetooth]
[ 10.981169] Call trace:
...
[ 10.981363] uart_update_mctrl+0x58/0x78
[ 10.981373] uart_dtr_rts+0x104/0x114
[ 10.981381] tty_port_shutdown+0xd4/0xdc
[ 10.981396] tty_port_close+0x40/0xbc
[ 10.981407] uart_close+0x34/0x9c
[ 10.981414] ttyport_close+0x50/0x94
[ 10.981430] serdev_device_close+0x40/0x50
[ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart]
[ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth]
[ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth]
[ 10.981862] hci_power_off+0x20/0x64 [bluetooth]
|
[] | null | null | null | null |
|
GHSA-82q8-cp6f-mm8v
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jojaba Access Category Password allows Reflected XSS.This issue affects Access Category Password: from n/a through 1.5.1.
|
[] | null | 7.1 | null | null |
|
CVE-2020-10367
|
Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a "Spectra" attack.
|
[] | null | 5.5 | null | null |
|
GHSA-mg6j-7hwf-j46v
|
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
|
[] | null | null | null | null |
|
CVE-2014-7919
|
b/libs/gui/ISurfaceComposer.cpp in Android allows attackers to trigger a denial of service (null pointer dereference and process crash).
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-vq49-7r44-hh7p
|
A vulnerability was found in PopojiCMS 2.0.1 and classified as problematic. This issue affects some unknown processing of the file install.php of the component Web Config. The manipulation of the argument Site Title with the input <script>alert(1)</script> leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-244229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 2.6 | null |
|
GHSA-9cqp-q38m-rfw4
|
In Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access.
|
[] | null | 8.3 | null | null |
|
GHSA-8grx-rjm9-f6qq
|
An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message.
|
[] | null | null | null | null |
|
CVE-2011-3012
|
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
|
[
"cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tremulous:tremulous:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:urbanterror:iourbanterror:2007-12-20:*:*:*:*:*:*:*",
"cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2023-52805
|
jfs: fix array-index-out-of-bounds in diAlloc
|
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix array-index-out-of-bounds in diAlloc
Currently there is not check against the agno of the iag while
allocating new inodes to avoid fragmentation problem. Added the check
which is required.
|
[] | null | 7.8 | null | null |
CVE-2021-40826
|
Clementine Music Player through 1.3.1 is vulnerable to a User Mode Write Access Violation, affecting the MP3 file parsing functionality at clementine+0x3aa207. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.
|
[
"cpe:2.3:a:clementine-player:clementine:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2005-1728
|
MCX Client for Apple Mac OS X 10.4.x up to 10.4.1 insecurely logs Portable Home Directory credentials, which allows local users to obtain the credentials.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2006-1842
|
Cross-site scripting (XSS) vulnerability in global.php in ShoutBOOK 1.1 allows remote attackers to inject arbitrary web script or HTML via the (1) NAME and (2) COMMENTS parameters.
|
[
"cpe:2.3:a:cynical_games:shoutbook:1.1:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-373h-5fj9-5xc7
|
Full path disclosure in the Googlemaps plugin before 3.1 for Joomla!.
|
[] | null | null | 5.3 | null |
|
CVE-2024-24150
|
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
|
[
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2024-42423
|
Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering.
|
[
"cpe:2.3:a:citrix:workspace:23.9.0.24.4:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:thinos:2402:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:thinos:2311:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2013-4857
|
D-Link DIR-865L has PHP File Inclusion in the router xml file.
|
[
"cpe:2.3:o:dlink:dir-865l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-22930
|
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
|
[
"cpe:2.3:a:mingsoft:mcms:5.2.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-48987
|
Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values.
|
[
"cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
|
CVE-2012-2864
|
Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
|
[
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.8:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.9:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.11:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.13:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.15:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.17:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.31:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.32:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.33:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.34:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.35:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.36:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.37:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.38:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.39:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.41:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.46:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.47:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.48:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.49:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.50:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.79:*:*:*:*:*:*:*",
"cpe:2.3:h:acer:ac700_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:cr-48_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_550_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_chromebook:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-qqfg-frwj-847v
|
Untrusted search path vulnerability in Microsoft Internet Explorer 9 on Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."
|
[] | null | null | null | null |
|
CVE-2017-10356
|
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | 2.1 |
|
GHSA-7j77-rcrw-mhm8
|
Microsoft Message Queuing Denial of Service Vulnerability
|
[] | null | 6.5 | null | null |
|
GHSA-w49r-x3v6-c9fq
|
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit_query_account.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null |
|
GHSA-g78f-6xq7-rrhq
|
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to gain privileges by accessing unintended API endpoints on a user's behalf.
|
[] | null | null | null | null |
|
GHSA-pj74-hxf7-xf99
|
There is an LDAP bind credentials exposure on KACE Systems Deployment and Remote Site appliances 9.0.146. The captured credentials may provide a higher privilege level on the Active Directory domain. To exploit this, an authenticated attacker edits the user-authentication settings to specify an attacker-controlled LDAP server, clicks the Test Settings button, and captures the cleartext credentials.
|
[] | null | 6.5 | null | null |
|
CVE-2020-35462
|
Version 3.16.0 of the CoScale agent Docker image contains a blank password for the root user. Systems deployed using affected versions of the CoScale agent container may allow a remote attacker to achieve root access with a blank password.
|
[
"cpe:2.3:a:coscale_agent_project:coscale_agent:3.16.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2025-24452
|
InDesign Desktop | Out-of-bounds Write (CWE-787)
|
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
CVE-2022-47578
|
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. NOTE: the vendor's position is "it's not a vulnerability in our product."
|
[
"cpe:2.3:a:zohocorp:manageengine_device_control_plus:10.1.2228.15:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-cgqc-747x-pr3m
|
Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0624, CVE-2011-0625, and CVE-2011-0626.
|
[] | null | null | null | null |
|
CVE-2017-18060
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for resp_event->vdev_id in wma_unified_bcntx_status_event_handler(), which is received from firmware, leads to potential out of bounds memory read.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-8wfc-hch7-gvrx
|
Directory traversal vulnerability in the MimeBodyPart.getFileName method in JavaMail 1.3.2 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in the Content-Disposition header.
|
[] | null | null | null | null |
|
CVE-2013-7179
|
The ping functionality in cgi-bin/diagnostic.cgi on Seowon Intech SWC-9100 routers allows remote attackers to execute arbitrary commands via shell metacharacters in the ping_ipaddr parameter.
|
[
"cpe:2.3:h:seowonintech:swc-9100:-:*:*:*:*:*:*:*"
] | null | null | null | 8.3 |
|
GHSA-qm43-g2xj-hvg5
|
User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
|
[] | null | 5.3 | null | null |
|
GHSA-7g24-qg88-p43q
|
jose4j uses weak cryptographic algorithm
|
jose4j before v0.9.3 allows attackers to set a low PBES2 iteration count of 1000 or less.
|
[] | null | 7.5 | null | null |
CVE-2021-28628
|
Adobe Experience Manager Cross-site Scripting vulnerability in inbox render.jsp
|
Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by a Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:cloud_service:*:*:*"
] | null | 6.3 | null | null |
GHSA-h676-pjr4-hgqx
|
Path Traversal in S-Cart
|
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
|
[] | null | 4.4 | null | null |
RHSA-2025:9838
|
Red Hat Security Advisory: Satellite 6.15.5.3 Async Update
|
cjson: segmentation violation in function cJSON_InsertItemInArray cjson: segmentation violation in function cJSON_SetValuestring sqlparse: parsing heavily nested list leads to denial of service cjson: segmentation violation trigger through the second parameter of function cJSON_SetValuestring at cJSON.c rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser
|
[
"cpe:/a:redhat:satellite:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.15::el8",
"cpe:/a:redhat:satellite_utils:6.15::el8"
] | null | 7.5 | null | null |
GHSA-8m85-9jc9-wrwp
|
RPM secure Stream can access any secure resource due to improper SMMU configuration and can lead to information disclosure in Snapdragon Industrial IOT, Snapdragon Mobile
|
[] | null | 5.5 | null | null |
|
CVE-2023-24146
|
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the minute parameter in the setRebootScheCfg function.
|
[
"cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2010:0140
|
Red Hat Security Advisory: pango security update
|
libpangoft2 segfaults on forged font files
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-76x5-m9p8-42mc
|
Buffer overflow in Stormy Studios Knet 1.04c and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP GET request.
|
[] | null | null | null | null |
|
GHSA-grp2-56hp-6jw2
|
WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 does not properly parse the length of a WordPerfect Graphics (WPG) file, which allows remote attackers to execute arbitrary code via a crafted WPG file, aka the "WPG Image File Heap Corruption Vulnerability."
|
[] | null | null | null | null |
|
CVE-2021-21122
|
Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-gqrc-m5mp-p6jj
|
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.faq.php (id parameter).
|
[] | null | null | 6.1 | null |
|
CVE-2011-3967
|
Unspecified vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via a crafted certificate.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2022:7134
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: information leak in scsi_ioctl() kernel: kernel info leak issue in pfkey_register kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.6 | null | null |
CVE-2018-11751
|
Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL. This issue is resolved in Puppet Agent 6.4.0.
|
[
"cpe:2.3:a:puppet:puppet_server:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 4.8 |
|
GHSA-25q6-m425-9fqr
|
Feehi CMS Cross-site Scripting
|
A stored cross-site scripting (XSS) vulnerability in `/index.php?r=site%2Fsignup` of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
|
[] | null | 5.4 | null | null |
CVE-2024-35582
|
A cross-site scripting (XSS) vulnerability in Sourcecodester Laboratory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Department input field.
|
[
"cpe:2.3:a:sourcecodester:laboratory_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-5w78-v688-cx9q
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[] | null | 5.4 | null | null |
ICSA-22-195-16
|
Siemens EN100 Ethernet Module
|
Affected applications contains a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint manupulating a specific argument. This could allow an attacker to crash the affected application leading to a denial of service condition
|
[] | null | 8.6 | null | null |
CVE-2019-9391
|
In libxaac, there is a possible out of bounds read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111050781
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-10956
|
Cross-Site WebSocket Hijacking in binary-husky/gpt_academic
|
GPT Academy version 3.83 in the binary-husky/gpt_academic repository is vulnerable to Cross-Site WebSocket Hijacking (CSWSH). This vulnerability allows an attacker to hijack an existing WebSocket connection between the victim's browser and the server, enabling unauthorized actions such as deleting conversation history without the victim's consent. The issue arises due to insufficient WebSocket authentication and lack of origin validation.
|
[] | null | null | 7.6 | null |
CVE-2021-24360
|
Yes/No Chart < 1.0.12 - Authenticated (contributor+) Blind SQL Injection
|
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks
|
[
"cpe:2.3:a:kohsei-works:yes\\/no_chart:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4 |
GHSA-hgwq-wchh-f9vv
|
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
|
[] | null | 5.5 | null | null |
|
CVE-2016-4960
|
For the NVIDIA Quadro, NVS, and GeForce products, the NVIDIA NVStreamKMS.sys service component is improperly validating user-supplied data through its API entry points causing an elevation of privilege.
|
[
"cpe:2.3:a:nvidia:geforce_experience:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_910m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_920m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_920mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_930m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_930mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_940m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_940mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_945m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_950m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_960m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_965m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvs_310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvs_315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvs_510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvs_810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_k1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_k420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_k620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*"
] | null | null | 7.3 | 6.9 |
|
GHSA-f55p-m2v7-m3pw
|
WebKit in Apple iOS before 9.3 and Safari before 9.1 allows remote attackers to bypass the Same Origin Policy and obtain physical-location data via a crafted geolocation request.
|
[] | null | null | 6.5 | null |
|
GHSA-jm6x-683j-pm4v
|
In the Linux kernel, the following vulnerability has been resolved:i2c: imx: fix reference leak when pm_runtime_get_sync failsIn i2c_imx_xfer() and i2c_imx_remove(), the pm reference count
is not expected to be incremented on return.However, pm_runtime_get_sync will increment pm reference count
even failed. Forgetting to putting operation will result in a
reference leak here.Replace it with pm_runtime_resume_and_get to keep usage
counter balanced.
|
[] | null | 5.5 | null | null |
|
CVE-2018-1554
|
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142891.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-gcc7-974f-gvp3
|
A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 3.9 | null |
|
GHSA-937f-c6gr-9r2j
|
IBM QRadar Incident Forensics 7.2 and 7.3 does not properly restrict the size or amount of resources requested which could allow an unauthenticated user to cause a denial of service. IBM X-Force ID: 144650.
|
[] | null | null | 7.5 | null |
|
CVE-2014-2545
|
TIBCO Managed File Transfer Internet Server before 7.2.2, Managed File Transfer Command Center before 7.2.2, Slingshot before 1.9.1, and Vault before 1.0.1 allow remote attackers to obtain sensitive information via a crafted HTTP request.
|
[
"cpe:2.3:a:tibco:slingshot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:slingshot:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:slingshot:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:slingshot:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:vault:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_command_center:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-5639
|
The ADT Taxis (aka com.icabbi.adttaxisApp) application 6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:adt-taxis:adt_taxis:6.0:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-1999-0834
|
Buffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library.
|
[
"cpe:2.3:a:rsa:rsaref:2.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-rhpx-9698-w5hr
|
Windows Themes Information Disclosure Vulnerability
|
[] | null | 4.7 | null | null |
|
GHSA-736r-p8hh-3qrw
|
An issue was discovered in idreamsoft iCMS V7.0.13. There is SQL Injection via the app/article/article.admincp.php _data_id parameter.
|
[] | null | null | 9.8 | null |
|
CVE-2020-10113
|
cPanel before 84.0.20 allows self XSS via a temporary character-set specification (SEC-515).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2003-0257
|
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
|
[
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2022-50229
|
ALSA: bcd2000: Fix a UAF bug on the error path of probing
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: bcd2000: Fix a UAF bug on the error path of probing
When the driver fails in snd_card_register() at probe time, it will free
the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug.
The following log can reveal it:
[ 50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
[ 50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0
[ 50.729530] Call Trace:
[ 50.732899] bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
Fix this by adding usb_kill_urb() before usb_free_urb().
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.