id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-49114
|
scsi: libfc: Fix use after free in fc_exch_abts_resp()
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: libfc: Fix use after free in fc_exch_abts_resp()
fc_exch_release(ep) will decrease the ep's reference count. When the
reference count reaches zero, it is freed. But ep is still used in the
following code, which will lead to a use after free.
Return after the fc_exch_release() call to avoid use after free.
|
[] | null | 7.8 | null | null | null |
CVE-2021-34334
|
Denial of service due to integer overflow in loop counter
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
|
[
"cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2020:2521
|
Red Hat Security Advisory: file security update
|
file: out-of-bounds read via a crafted ELF file
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 5.4 | null | null |
GHSA-wm5x-848w-83jx
|
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2024-42163
|
Password Manipulation
|
Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow attackers to take over the account of any user by predicting the token for the password reset link.
|
[
"cpe:2.3:a:fiware:keyrock:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
CVE-2008-4026
|
Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Word document that contains a malformed value, which triggers memory corruption, aka "Word Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:*:2007:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:sp1:2007:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-f8jj-6823-vfgv
|
In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.
|
[] | null | null | null | null | null |
|
CVE-2021-47034
|
powerpc/64s: Fix pte update for kernel memory on radix
|
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Fix pte update for kernel memory on radix
When adding a PTE a ptesync is needed to order the update of the PTE
with subsequent accesses otherwise a spurious fault may be raised.
radix__set_pte_at() does not do this for performance gains. For
non-kernel memory this is not an issue as any faults of this kind are
corrected by the page fault handler. For kernel memory these faults
are not handled. The current solution is that there is a ptesync in
flush_cache_vmap() which should be called when mapping from the
vmalloc region.
However, map_kernel_page() does not call flush_cache_vmap(). This is
troublesome in particular for code patching with Strict RWX on radix.
In do_patch_instruction() the page frame that contains the instruction
to be patched is mapped and then immediately patched. With no ordering
or synchronization between setting up the PTE and writing to the page
it is possible for faults.
As the code patching is done using __put_user_asm_goto() the resulting
fault is obscured - but using a normal store instead it can be seen:
BUG: Unable to handle kernel data access on write at 0xc008000008f24a3c
Faulting instruction address: 0xc00000000008bd74
Oops: Kernel access of bad area, sig: 11 [#1]
LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in: nop_module(PO+) [last unloaded: nop_module]
CPU: 4 PID: 757 Comm: sh Tainted: P O 5.10.0-rc5-01361-ge3c1b78c8440-dirty #43
NIP: c00000000008bd74 LR: c00000000008bd50 CTR: c000000000025810
REGS: c000000016f634a0 TRAP: 0300 Tainted: P O (5.10.0-rc5-01361-ge3c1b78c8440-dirty)
MSR: 9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 44002884 XER: 00000000
CFAR: c00000000007c68c DAR: c008000008f24a3c DSISR: 42000000 IRQMASK: 1
This results in the kind of issue reported here:
https://lore.kernel.org/linuxppc-dev/[email protected]/
Chris Riedl suggested a reliable way to reproduce the issue:
$ mount -t debugfs none /sys/kernel/debug
$ (while true; do echo function > /sys/kernel/debug/tracing/current_tracer ; echo nop > /sys/kernel/debug/tracing/current_tracer ; done) &
Turning ftrace on and off does a large amount of code patching which
in usually less then 5min will crash giving a trace like:
ftrace-powerpc: (____ptrval____): replaced (4b473b11) != old (60000000)
------------[ ftrace bug ]------------
ftrace failed to modify
[<c000000000bf8e5c>] napi_busy_loop+0xc/0x390
actual: 11:3b:47:4b
Setting ftrace call site to call ftrace function
ftrace record flags: 80000001
(1)
expected tramp: c00000000006c96c
------------[ cut here ]------------
WARNING: CPU: 4 PID: 809 at kernel/trace/ftrace.c:2065 ftrace_bug+0x28c/0x2e8
Modules linked in: nop_module(PO-) [last unloaded: nop_module]
CPU: 4 PID: 809 Comm: sh Tainted: P O 5.10.0-rc5-01360-gf878ccaf250a #1
NIP: c00000000024f334 LR: c00000000024f330 CTR: c0000000001a5af0
REGS: c000000004c8b760 TRAP: 0700 Tainted: P O (5.10.0-rc5-01360-gf878ccaf250a)
MSR: 900000000282b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 28008848 XER: 20040000
CFAR: c0000000001a9c98 IRQMASK: 0
GPR00: c00000000024f330 c000000004c8b9f0 c000000002770600 0000000000000022
GPR04: 00000000ffff7fff c000000004c8b6d0 0000000000000027 c0000007fe9bcdd8
GPR08: 0000000000000023 ffffffffffffffd8 0000000000000027 c000000002613118
GPR12: 0000000000008000 c0000007fffdca00 0000000000000000 0000000000000000
GPR16: 0000000023ec37c5 0000000000000000 0000000000000000 0000000000000008
GPR20: c000000004c8bc90 c0000000027a2d20 c000000004c8bcd0 c000000002612fe8
GPR24: 0000000000000038 0000000000000030 0000000000000028 0000000000000020
GPR28: c000000000ff1b68 c000000000bf8e5c c00000000312f700 c000000000fbb9b0
NIP ftrace_bug+0x28c/0x2e8
LR ftrace_bug+0x288/0x2e8
Call T
---truncated---
|
[] | null | 4.4 | null | null | null |
GHSA-7q9q-r7r5-4mf2
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
|
[] | null | null | 5.5 | null | null |
|
CVE-2010-0263
|
Microsoft Office Excel 2007 SP1 and SP2; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer SP1 and SP2; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; and Office SharePoint Server 2007 SP1 and SP2 do not validate ZIP headers during decompression of Open XML (.XLSX) documents, which allows remote attackers to execute arbitrary code via a crafted document that triggers access to uninitialized memory locations, aka "Microsoft Office Excel XLSX File Parsing Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
RHSA-2025:7896
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt kernel: vsock: Keep the binding until socket destruction
|
[
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 7.8 | null | null | null |
GHSA-893r-9r35-x6c2
|
Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-43006
|
A stored cross-site scripting (XSS) vulnerability exists in ZZCMS2023 in the ask/show.php file at line 21. An attacker can exploit this vulnerability by sending a specially crafted POST request to /user/ask_edit.php?action=add, which includes malicious JavaScript code in the 'content' parameter. When a user visits the ask/show_{newsid}.html page, the injected script is executed in the context of the user's browser, leading to potential theft of cookies, session tokens, or other sensitive information.
|
[
"cpe:2.3:a:zzcms:zzmcms:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-ggmg-hmvc-33cf
|
Adobe Animate version 21.0.6 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
CVE-2002-1892
|
NETGEAR FVS318 running firmware 1.1 stores the username and password in a readable format when a backup of the configuration file is made, which allows local users to obtain sensitive information.
|
[
"cpe:2.3:h:netgear:fvs318:1.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2001-0633
|
Directory traversal vulnerability in Sun Chili!Soft ASP on multiple Unixes allows a remote attacker to read arbitrary files above the web root via a '..' (dot dot) attack in the sample script 'codebrws.asp'.
|
[
"cpe:2.3:a:sun:chilisoft:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2020:0912
|
Red Hat Security Advisory: tomcat6 security update
|
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.6 | null | null | null |
RHSA-2022:0274
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null | null |
ICSA-13-142-01
|
3S CODESYS Gateway Use After Free
|
Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
CVE-2011-4295
|
The moodle_enrol_external:role_assign function in enrol/externallib.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 does not have an authorization check, which allows remote authenticated users to gain privileges by making a role assignment.
|
[
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-6m6r-34m3-5m2p
|
Directory traversal vulnerability in htdocs/install/index.php in XOOPS 2.0.18 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
|
[] | null | null | null | null | null |
|
CVE-2016-2833
|
Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-hv69-r3wr-rq9m
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
CVE-2019-6750
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7639.
|
[
"cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-267h-f5j4-cxf5
|
Cross-site scripting (XSS) vulnerability in Joomla! CMS 2.5.x before 2.5.19 and 3.x before 3.2.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-cp9q-6fwr-c66g
|
The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.
|
[] | null | 9.8 | null | null | null |
|
CVE-2010-3944
|
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-hvcg-q97m-g247
|
An issue was discovered on Samsung mobile devices with JBP(4.3) and KK(4.4.2) software. Because the READ_LOGS permission is mishandled, sensitive information is disclosed in a world-readable copy of the log file if the error message is "Unhandled exception in Dalvik VM," "Application not responding ANR event," or "Crash on an application's native code." The Samsung ID is SVE-2015-2885 (October 2015).
|
[] | null | null | null | null | null |
|
CVE-2024-43057
|
Use After Free in MProc
|
Memory corruption while processing command in Glink linux.
|
[] | null | 7.8 | null | null | null |
CVE-2006-5923
|
PHP remote file inclusion vulnerability in index.php in Chris Mac gtcatalog (aka GimeScripts Shopping Catalog) 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the custom parameter.
|
[
"cpe:2.3:a:chris_mac:gimescripts_shopping_catalog:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-vv24-8fr3-mqjj
|
The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
|
[] | null | null | null | null | null |
|
CVE-2021-29727
|
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 201106.
|
[
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*"
] | null | null | 6.2 | null | null |
|
CVE-2017-8499
|
Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the Edge JavaScript scripting engine fails to handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8520, CVE-2017-8521, CVE-2017-8548, and CVE-2017-8549.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
CVE-2024-31327
|
In multiple functions of MessageQueueBase.h, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-mhh3-fh8g-2849
|
SQL injection vulnerability in the LTree converter in Pomm before 1.1.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-9065
|
In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2021-26411
|
Internet Explorer Memory Corruption Vulnerability
|
Internet Explorer Memory Corruption Vulnerability
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-c5jj-9wj5-5cv4
|
The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 9.8 | null | null | null |
|
GHSA-86xj-57mh-7xc3
|
The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2023:5978
|
Red Hat Security Advisory: Red Hat JBoss EAP 7.4.13 XP 4.0.0.GA security release
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:jbosseapxp"
] | null | 7.5 | null | null | null |
CVE-2024-0944
|
Totolink T8 cstecgi.cgi session expiration
|
A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252188. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.833_20220905:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | null | 3.7 | 3.7 | 2.6 | null |
CVE-2022-48309
|
A CSRF vulnerability allows malicious websites to retrieve logs and technical support archives in Sophos Connect versions older than 2.2.90.
|
[
"cpe:2.3:a:sophos:connect:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-22qj-6c22-mwj2
|
NetMod VPN Client 5.3.1 is vulnerable to DLL injection, allowing an attacker to execute arbitrary code by placing a malicious DLL in a directory where the application loads dependencies. This vulnerability arises due to the improper validation of dynamically loaded libraries.
|
[] | null | 7.3 | null | null | null |
|
RHSA-2021:0053
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null | null |
ICSA-12-177-02
|
Invensys Wonderware InTouch 10 DLL Hijack
|
Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[] | null | null | null | null | null |
cisco-sa-20190619-rvrouters-dos
|
Cisco RV110W, RV130W, and RV215W Routers Management Interface Denial of Service Vulnerability
|
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to reload the device and causing a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rvrouters-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rvrouters-dos"]
|
[] | null | null | 8.6 | null | null |
CVE-2019-0330
|
The OS Command Plugin in the transaction GPA_ADMIN and the OSCommand Console of SAP Diagnostic Agent (LM-Service), version 7.2, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
|
[
"cpe:2.3:a:sap:diagnostics_agent:7.20:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.5 | null |
|
GHSA-5mrh-w763-m7g3
|
In BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783657References: N/A
|
[] | null | 4.4 | null | null | null |
|
GHSA-92m2-pq3g-j4xf
|
IBM Sterling File Gateway 2.2.0.0 through 6.1.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197666.
|
[] | null | null | null | null | null |
|
GHSA-q75j-qph2-cwg9
|
Cross-site scripting (XSS) vulnerability in the addAlert function in the RedirectServlet servlet in oVirt Engine and Red Hat Enterprise Virtualization Manager (RHEV-M), as used in Red Hat Enterprise Virtualization 3 and 3.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-m9j4-4947-qrrp
|
A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user.
|
[] | null | null | null | null | null |
|
CVE-2021-39693
|
In onUidStateChanged of AppOpsService.java, there is a possible way to access location without a visible indicator due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208662370
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2011-2251
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.3.0.3 allows remote attackers to affect integrity via unknown vectors.
|
[
"cpe:2.3:a:oracle:secure_backup:10.3.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-c687-3w98-pg2q
|
Statutory Reporting for Insurance Companies in SAP ERP (EA-FINSERV versions - 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) does not execute the required authorization checks for an authenticated user, allowing an attacker to view and tamper with certain restricted data leading to Missing Authorization Check.
|
[] | null | null | null | null | null |
|
GHSA-gw25-hcr4-7p5h
|
XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
|
[] | null | null | null | null | null |
|
GHSA-mpfh-94p7-8328
|
In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: fix RCU stall while reaping monitor destination ringWhile processing the monitor destination ring, MSDUs are reaped from the
link descriptor based on the corresponding buf_id.However, sometimes the driver cannot obtain a valid buffer corresponding
to the buf_id received from the hardware. This causes an infinite loop
in the destination processing, resulting in a kernel crash.kernel log:
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failedFix this by skipping the problematic buf_id and reaping the next entry,
replacing the break with the next MSDU processing.Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
|
[] | null | 5.5 | null | null | null |
|
GHSA-6cw3-gfh7-8mvv
|
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
|
[] | null | null | null | null | null |
|
GHSA-q359-h8vg-fv67
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the picture elements within XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5216.
|
[] | null | null | 8.8 | null | null |
|
GHSA-xm97-4p58-pfr9
|
Multiple use-after-free vulnerabilities in libarchive 2.8.4 and 2.8.5 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted (1) TAR archive or (2) ISO9660 image.
|
[] | null | null | null | null | null |
|
GHSA-3f9w-fv2p-w675
|
The all-in-one-wp-security-and-firewall plugin before 3.9.1 for WordPress has multiple SQL injection issues.
|
[] | null | null | 9.8 | null | null |
|
GHSA-3ghf-mqfr-9xvw
|
A vulnerability, which was classified as critical, was found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file manage_student.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226272.
|
[] | null | null | 6.3 | null | null |
|
CVE-2022-3965
|
ffmpeg QuickTime Graphics Video Encoder smcenc.c smc_encode_stream out-of-bounds
|
A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-3522-f7v7-pv57
|
The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible for authenticated attackers, with group leader-level access and above, to add users to their group which ultimately allows them to leverage CVE-2024-8349 and gain admin access to the site.
|
[] | null | 2.7 | null | null | null |
|
GHSA-7jrh-j28c-296f
|
IBM Planning Analytics Local 2.0 and 2.1 connects to a MongoDB server. MongoDB, a document-oriented database system, is listening on the remote port, and it is configured to allow connections without password authentication. A remote attacker can gain unauthorized access to the database. IBM X-Force ID: 292420.
|
[] | null | 6.7 | null | null | null |
|
CVE-2023-6559
|
The MW WP Form plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 5.0.3. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.
|
[
"cpe:2.3:a:web-soudan:mw_wp_form:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2021-45472
|
In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2021-22527
|
Information leakage vulnerability in NetIQ Access Manager versions prior to version 4.5.4 and 5.0.1
|
Information leakage vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4
|
[
"cpe:2.3:a:microfocus:access_manager:*:*:*:*:*:*:*:*"
] | null | 6 | null | null | null |
GHSA-vhpx-94rf-79c2
|
Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilities
|
[] | null | 9.8 | null | null | null |
|
CVE-2006-0699
|
Cross-site scripting (XSS) vulnerability in search.php in QWikiWiki 1.5, and possibly 1.5.1 and other versions, allows remote attackers to inject arbitrary web script or HTML via the query parameter.
|
[
"cpe:2.3:a:david_barrett:qwikiwiki:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_barrett:qwikiwiki:1.5.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mfv6-g85c-7863
|
In Horde Groupware 5.2.19 and 5.2.21, there is XSS via the Color field in a Create Task List action.
|
[] | null | null | 5.4 | null | null |
|
CVE-2004-2002
|
Unknown vulnerability in SGI IRIX 6.5 through 6.5.22m allows remote attackers to cause a denial of service via a certain UDP packet.
|
[
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.22m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5_20:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2001-0479
|
Directory traversal vulnerability in phpPgAdmin 2.2.1 and earlier versions allows remote attackers to execute arbitrary code via a .. (dot dot) in an argument to the sql.php script.
|
[
"cpe:2.3:a:phppgadmin:phppgadmin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgadmin:phppgadmin:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-3893
|
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.4. A malicious application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2024-32458
|
FreeRDP Out-Of-Bounds Read in planar_skip_plane_rle
|
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
|
[
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-6vpx-f5jx-6w5m
|
An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
|
[] | null | 9.1 | null | null | null |
|
CVE-2010-3655
|
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2007-3400
|
The NCTAudioEditor2 ActiveX control in NCTWMAFile2.dll 2.6.2.157, as distributed in NCTAudioEditor and NCTAudioStudio 2.7, allows remote attackers to overwrite arbitrary files via the CreateFile method.
|
[
"cpe:2.3:a:nctsoft:nctaudioeditor:_nil_:*:*:*:*:*:*:*",
"cpe:2.3:a:nctsoft:nctaudiostudio:2.7:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-mvqc-qf5q-pvwc
|
Reflected Cross-Site Scripting exists in the Java System Solutions SSO plugin 4.0.13.1 for BMC MyIT. A remote attacker can abuse this issue to inject client-side scripts into the "select_sso()" function. The payload is triggered when the victim opens a prepared /ux/jss-sso/arslogin?[XSS] link and then clicks the "Login" button.
|
[] | null | null | 6.1 | null | null |
|
CVE-2000-0344
|
The knfsd NFS server in Linux kernel 2.2.x allows remote attackers to cause a denial of service via a negative size value.
|
[
"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-45803
|
Cross site scripting (XSS) Vulnerability on route /wireui/button?label=Content in wireui
|
Wire UI is a library of components and resources to empower Laravel and Livewire application development. A potential Cross-Site Scripting (XSS) vulnerability has been identified in the `/wireui/button` endpoint, specifically through the `label` query parameter. Malicious actors could exploit this vulnerability by injecting JavaScript into the `label` parameter, leading to the execution of arbitrary code in the victim's browser. The `/wireui/button` endpoint dynamically renders button labels based on user-provided input via the `label` query parameter. Due to insufficient sanitization or escaping of this input, an attacker can inject malicious JavaScript. By crafting such a request, an attacker can inject arbitrary code that will be executed by the browser when the endpoint is accessed. If exploited, this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the affected website. This could lead to: **Session Hijacking**: Stealing session cookies, tokens, or other sensitive information. **User Impersonation**: Performing unauthorized actions on behalf of authenticated users. **Phishing**: Redirecting users to malicious websites. **Content Manipulation**: Altering the appearance or behavior of the affected page to mislead users or execute further attacks. The severity of this vulnerability depends on the context of where the affected component is used, but in all cases, it poses a significant risk to user security. This issue has been addressed in release versions 1.19.3 and 2.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:wireui:wireui:*:*:*:*:*:*:*:*"
] | 5.1 | null | null | null | null |
RHSA-2023:6187
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
GHSA-7j9v-q7mg-95rm
|
Buffer overflow in the IMAP service of Rockliffe MailSite before 6.1.22.1 allows remote attackers to have an unknown impact via unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-23xg-g252-mcgr
|
SQL injection vulnerability in the Downloads module for PHP-Nuke 8.0 8.1.0.3.5b and earlier allows remote authenticated users to execute arbitrary SQL commands via the url parameter in the Add operation to modules.php.
|
[] | null | null | null | null | null |
|
CVE-2022-35699
|
Adobe Bridge Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2022-2392
|
Lana Downloads Manager < 1.8.0 - Contributor+ Arbitrary File Download
|
The Lana Downloads Manager WordPress plugin before 1.8.0 is affected by an arbitrary file download vulnerability that can be exploited by users with "Contributor" permissions or higher.
|
[
"cpe:2.3:a:lana:lana_downloads_manager:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-2h3c-j9ff-jxhq
|
An issue was discovered in OBS-Studio 29.1.1, plaintext storage of passwords.
|
[] | null | null | null | null | null |
|
GHSA-q2fr-2m3c-8rfc
|
Cross-site scripting (XSS) vulnerability in search.aspx in SweetSuite.NET Content Management System (ssCMS) 2.1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-47127
|
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd parameter at /goform/WifiBasicSet.
|
[
"cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-cj7x-83xx-p9jq
|
Memory corruption in i2c buses due to improper input validation while reading address configuration from i2c driver in Snapdragon Mobile, Snapdragon Wearables
|
[] | null | 7.8 | null | null | null |
|
GHSA-wwrp-f96g-5fc7
|
Cross-Site Request Forgery (CSRF) vulnerability in Tyche Softwares Currency per Product for WooCommerce.This issue affects Currency per Product for WooCommerce: from n/a through 1.6.0.
|
[] | null | 4.3 | null | null | null |
|
CVE-2022-29676
|
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/lists/zhuan.
|
[
"cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
CVE-2023-46499
|
Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted scripts to the Admin Panel.
|
[
"cpe:2.3:a:evershop:evershop:1.0.0:beta:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:beta1:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:beta2:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:beta3:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:beta4:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:beta5:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:rc1:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:rc2:*:*:*:node.js:*:*",
"cpe:2.3:a:evershop:evershop:1.0.0:rc3:*:*:*:node.js:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2010-1998
|
Cross-site scripting (XSS) vulnerability in the CCK TableField module 6.x before 6.x-1.2 for Drupal allows remote authenticated users, with certain node creation or editing privileges, to inject arbitrary web script or HTML via table headers.
|
[
"cpe:2.3:a:kevinhankens:tablefield:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kevinhankens:tablefield:6.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kevinhankens:tablefield:6.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:kevinhankens:tablefield:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2007-5711
|
Massive Entertainment World in Conflict 1.001 and earlier allows remote attackers to cause a denial of service (failed assertion and daemon crash) via a large packet to TCP or UDP port 48000.
|
[
"cpe:2.3:a:massive_entertainment:world_in_conflict:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2021:5106
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.z security update
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.1 | null | null | null |
GHSA-c4jh-pwxf-76p2
|
Stack-based buffer overflow in jstest_main.c in mujstest in Artifex Software, Inc. MuPDF 1.10a allows remote attackers to have unspecified impact via a crafted image.
|
[] | null | 7.8 | null | null | null |
|
GHSA-9r3v-4452-42x7
|
A prompt injection vulnerability in the chatbox of Zhipu AI CodeGeeX v2.17.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.
|
[] | null | 7.5 | null | null | null |
|
GHSA-fjqq-2vwg-x669
|
An issue was discovered in Faronics Insight 10.0.19045 on Windows. Every keystroke made by any user on a computer with the Student application installed is logged to a world-readable directory. A local attacker can trivially extract these cleartext keystrokes, potentially enabling them to obtain PII and/or to compromise personal accounts owned by the victim.
|
[] | null | 3.3 | null | null | null |
|
CVE-2020-2839
|
Vulnerability in the Oracle Service Intelligence product of Oracle E-Business Suite (component: Internal Operations- Search). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Service Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle Service Intelligence accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:service_intelligence:*:*:*:*:*:*:*:*"
] | null | null | 8.2 | null | null |
|
CVE-2022-23837
|
In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
|
[
"cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.