id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2009-1348
|
The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
|
[
"cpe:2.3:a:mcafee:active_virus_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:active_virusscan:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:internet_security_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:internet_security_suite:2004:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:internet_security_suite:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:internet_security_suite:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:internet_security_suite:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:securityshield_for_email_servers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:securityshield_for_microsoft_isa_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:securityshield_for_microsoft_sharepoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:total_protection:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:total_protection_for_endpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_commandline:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_enterprise:-:-:linux:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_enterprise:-:-:sap:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_enterprise:-:-:storage:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_plus:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_usb:*:*:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
GHSA-3wcq-x3mq-6r9p
|
Potential memory exposure in dns-packet
|
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
|
[] | null | 7.7 | null | null | null |
GHSA-xf62-wwm9-m968
|
The Sydney Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aThemes Slider button element in all versions up to, and including, 1.25 due to insufficient input sanitization and output escaping on user supplied link. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-21005
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
|
[
"cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:data_infrastructure_insights_acquisition_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_infrastructure_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
cisco-sa-20190925-ctspac-dos
|
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability
|
A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition.
The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 6.8 | null | null |
GHSA-5f97-9cgp-7wqg
|
Vulnerability in Oracle Application Express (component: Strategic Planner Starter App). Supported versions that are affected are 24.2.4 and 24.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | 9 | null | null | null |
|
GHSA-p479-3f3h-vrr7
|
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'firmwall keyword WORD description (WORD|null)' command template.
|
[] | null | 9.8 | null | null | null |
|
GHSA-425v-6qh8-hmjx
|
Missing Authorization vulnerability in cedcommerce Ship Per Product allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Ship Per Product: from n/a through 2.1.0.
|
[] | null | 5.3 | null | null | null |
|
GHSA-7fc3-m2rj-qwhj
|
Broadcom RAID Controller web interface is vulnerable Denial of Service can be caused by an authenticated user to the REST API Interface
|
[] | null | 6.5 | null | null | null |
|
GHSA-ffx6-9j66-fwh2
|
The MediaTek video driver in Android before 2016-07-05 on Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28175027 and MediaTek internal bug ALPS02693739.
|
[] | null | null | 7.8 | null | null |
|
GHSA-7vrc-3785-x4qx
|
A security vulnerability was discovered in the local status page functionality of Cisco Meraki’s MX67 and MX68 security appliance models that may allow unauthenticated individuals to access and download logs containing sensitive, privileged device information. The vulnerability is due to improper access control to the files holding debugging and maintenance information, and is only exploitable when the local status page is enabled on the device. An attacker exploiting this vulnerability may obtain access to wireless pre-shared keys, Site-to-Site VPN key and other sensitive information. Under certain circumstances, this information may allow an attacker to obtain administrative-level access to the device.
|
[] | null | null | 5.3 | null | null |
|
CVE-2019-2521
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.4 | null |
|
CVE-2014-8324
|
network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
|
[
"cpe:2.3:a:aircrack-ng:aircrack-ng:*:beta2:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-pqjm-xcp8-wgmm
|
Ez Platform and Legacy are prone to an insecure interpretation of PHP/PHAR uploads
|
The eZ Platform and Legacy are affected by an issue related to how uploaded PHP and PHAR files are handled, and consists of two parts: 1. Web server configuration, and 2. Disabling the PHAR stream wrapper.**1. WEB SERVER CONFIGURATION**
The sample web server configuration in our documentation can in some cases allow the execution of uploaded PHP/PHAR code. This can be abused to allow priviledge escalation and breach of content access controls, among other things. Please ensure that your web server will not execute files in directories were files may be uploaded, such as web/var/ and ezpublish_legacy/var/As an example, here is how you can make Apache return HTTP 403 Forbidden for a number of executable file types in your eZ Platform var directory. Please adapt it to your needs. It is then possible to enable logging of HTTP 403 in a separate log file if you wish, you could do this to see if someone is trying to abuse the server.Here is the same configuration, but for the Nginx web server:**2. DISABLE PHAR STREAM WRAPPER**
PHAR archives may be crafted such that its stream wrapper will execute them without being specifically asked to. With such files, any PHP file operation may cause deserialisation and execution. This may happen even if the file name suffix isn't ".phar". Any site that allows file uploads is at risk. Normally eZ Platform has no need for PHAR support. It's only used by Composer, and that is executed separately from eZ Platform. So one way to avoid this vulnerability is to disable the PHAR stream wrapper within eZ Platform. (If you know you need PHAR support, please consider other means to deal with this vulnerability. For example, enabling the wrapper only in those scripts/bundles that have to deal with such files.)Disabling the stream wrapper should be done in:eZ Platform (web/app.php)
CLI scripts (bin/console)
Legacy (index.php and CLI scripts)To install, use Composer to update to one of the "Resolving versions" mentioned above, or apply these patches manually:
https://github.com/ezsystems/ezplatform/commit/9a0c52dc4535e4b3ce379f80222dc53f705a2cfd
https://github.com/ezsystems/ezpublish-legacy/commit/d21957bf202b091ab39dfb5be300f6c30be3933e
|
[] | null | null | null | null | null |
CVE-2025-23387
|
Rancher's SAML-based login via CLI can be denied by unauthenticated users
|
A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher allowed unauthenticated users to list all CLI authentication tokens and delete them before the CLI is able to get the token value.This issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.
|
[] | null | 5.3 | null | null | null |
RHSA-2024:3868
|
Red Hat Security Advisory: Network Observability 1.6.0 for OpenShift
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON follow-redirects: Possible credential leak express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak
|
[
"cpe:/a:redhat:network_observ_optr:1.6.0::el9"
] | null | 7.4 | null | null | null |
GHSA-hc48-4j8c-2qfp
|
SQL injection vulnerability in jsp/reports/ReportsAudit.jsp in McAfee Asset Manager 6.6 allows remote authenticated users to execute arbitrary SQL commands via the username of an audit report (aka user parameter).
|
[] | null | null | null | null | null |
|
GHSA-f5pw-7229-3wqr
|
The ff_MPV_frame_start function in libavcodec/mpegvideo.c in FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors, related to starting "a frame outside SETUP state."
|
[] | null | null | null | null | null |
|
CVE-2022-41963
|
BigBlueButton contains Improper Preservation of Permissions for whiteboard
|
BigBlueButton is an open source web conferencing system. Versions prior to 2.4.3 contain a whiteboard grace period that exists to handle delayed messages, but this grace period could be used by attackers to take actions in the few seconds after their access is revoked. The attacker must be a meeting participant. This issue is patched in version 2.4.3 an version 2.5-alpha-1
|
[
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
GHSA-jcm2-jp9c-jcgg
|
The cairo_image_surface_get_data function in Cairo 1.10.2, as used in GTK+ and Wireshark, allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a large string.
|
[] | null | null | null | null | null |
|
CVE-2008-0753
|
SQL injection vulnerability in calendar.php in Virtual War (VWar) 1.5 allows remote attackers to execute arbitrary SQL commands via the month parameter.
|
[
"cpe:2.3:a:vwar:virtual_war:1.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-rgvh-3cch-xp7q
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.4 | null | null | null |
|
GHSA-44h6-7xw4-35hg
|
Recourse ManTrap 1.6 allows attackers to cause a denial of service via a sequence of commands that navigate into and out of the /proc/self directory and executing various commands such as ls or pwd.
|
[] | null | null | null | null | null |
|
GHSA-wgrp-46g8-hr3f
|
The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors.
|
[] | null | null | 9.1 | null | null |
|
GHSA-r8h6-7wjg-5hcv
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
CVE-2009-2851
|
Cross-site scripting (XSS) vulnerability in the administrator interface in WordPress before 2.8.2 allows remote attackers to inject arbitrary web script or HTML via a comment author URL.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mp98-8f97-44qx
|
Improper integrity check can lead to race condition between tasks PDCP and RRC? right after a valid RRC Command packet has been received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
|
[] | null | 8.1 | null | null | null |
|
GHSA-vjgx-6cj7-qwh6
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
|
[] | null | null | null | null | null |
|
GHSA-wpr8-w3v4-h4fx
|
Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3.
|
[] | null | 7.1 | null | null | null |
|
GHSA-xh2r-p757-pg5v
|
Vulnerability in the Oracle Customer Interaction History component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Interaction History accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[] | null | null | 8.2 | null | null |
|
GHSA-3hg9-j6q2-m4g8
|
Cross-site scripting (XSS) vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter.
|
[] | null | null | null | null | null |
|
GHSA-w2j7-cqvr-h9j4
|
An issue was discovered in Mods for HESK 3.1.0 through 2019.1.0. A privileged user can achieve code execution on the server via a ticket because of improper access control of uploaded resources. This might be exploitable in conjunction with CVE-2020-13992 by an unauthenticated attacker.
|
[] | null | null | null | null | null |
|
GHSA-j5h7-4pm3-jc94
|
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4, 10.0.2, 10.3.3, 10.3.4, and 10.3.5 allows remote authenticated users to affect integrity, related to WLS-Console.
|
[] | null | null | null | null | null |
|
GHSA-j6q8-9xcm-qvmj
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aThemes aThemes Addons for Elementor. This issue affects aThemes Addons for Elementor: from n/a through 1.0.15.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-10217
|
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
|
[
"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*"
] | null | null | 5.7 | null | null |
|
GHSA-cx2h-5vcq-pfj4
|
Windows MapUrlToZone Denial of Service Vulnerability
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-38032
|
Microsoft Xbox Remote Code Execution Vulnerability
|
Microsoft Xbox Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2020-36157
|
An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Roles. Due to the lack of filtering on the role parameter that could be supplied during the registration process, an attacker could supply the role parameter with a WordPress capability (or any custom Ultimate Member role) and effectively be granted those privileges.
|
[
"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*"
] | null | 10 | null | null | null |
|
GHSA-v69f-4qw7-8fp4
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3, 6.3.1, and 6.3.2 allows remote authenticated users to affect availability via unknown vectors related to Data, Domain & Function Security.
|
[] | null | null | null | null | null |
|
CVE-2025-48997
|
Multer vulnerable to Denial of Service via unhandled exception
|
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available.
|
[] | 8.7 | null | null | null | null |
CVE-2003-0355
|
Safari 1.0 Beta 2 (v73) and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates.
|
[
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror_embedded:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vmfg-rjjm-rjrj
|
QOS.ch Logback vulnerable to Deserialization of Untrusted Data
|
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.
|
[] | null | null | 9.8 | null | null |
GHSA-wpqp-8p76-3p7h
|
RoxyFileman, as shipped with nopCommerce v4.2.0, is vulnerable to ../ path traversal via d or f to Admin/RoxyFileman/ProcessRequest because of Libraries/Nop.Services/Media/RoxyFileman/FileRoxyFilemanService.cs.
|
[] | null | null | null | null | null |
|
CVE-2025-26264
|
GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.
|
[] | null | 8.8 | null | null | null |
|
GHSA-269f-h4cx-j3fr
|
An issue was discovered in the MediaWikiChat extension for MediaWiki through 1.42.1. CSRF can occur in API modules.
|
[] | null | 6.5 | null | null | null |
|
GHSA-9p64-9rxj-34pm
|
An issue in the OTP mechanism of Chavara Family Welfare Centre Chavara Matrimony Site v2.0 allows attackers to bypass authentication via supplying a crafted request.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2020:1132
|
Red Hat Security Advisory: python3 security update
|
python: Cookie domain check returns incorrect results python: email.utils.parseaddr wrongly parses email addresses
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null | null |
CVE-2023-36640
|
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands
|
[
"cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-8j9v-7cj9-xpfp
|
Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
|
[] | null | null | null | null | null |
|
ICSA-23-257-01
|
Siemens SIMATIC, SIPLUS Products
|
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.
This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
|
[] | null | 7.5 | null | null | null |
CVE-2007-4546
|
Unreal Commander 0.92 build 565 and 573 lists the filenames from the Central Directory of a ZIP archive, but extracts to local filenames corresponding to names in Local File Header fields in this archive, which might allow remote attackers to trick a user into performing a dangerous file overwrite or creation.
|
[
"cpe:2.3:a:x-diesel:unreal_commander:0.92_build565:*:*:*:*:*:*:*",
"cpe:2.3:a:x-diesel:unreal_commander:0.92_build573:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2025-5345
|
Exposed AIDL service allowing to read and delete files with system-level privileges in Bluebird filemanager application
|
Bluebird devices contain a pre-loaded file manager application. This application exposes an unsecured service provider "com.bluebird.system.koreanpost.IsdcardRemoteService". A local attacker can bind to the AIDL-type service to copy and delete arbitrary files from device's storage with system-level permissions.
Version 1.4.4 is vulnerable, vendor reverted vulnerable versions to older version: 1.3.6
|
[] | 6.3 | null | null | null | null |
CVE-2024-23499
|
Protection mechanism failure in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an unauthenticated user to potentially enable denial of service via network access.
|
[
"cpe:2.3:h:intel:ethernet_network_controller_e810:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:ethernet_800_series_controllers_driver:*:*:*:*:*:linux:*:*"
] | 7 | 6.5 | null | null | null |
|
CVE-2023-47643
|
SuiteCRM has Unauthenticated Graphql Introspection Enabled
|
SuiteCRM is a Customer Relationship Management (CRM) software application. Prior to version 8.4.2, Graphql Introspection is enabled without authentication, exposing the scheme defining all object types, arguments, and functions. An attacker can obtain the GraphQL schema and understand the entire attack surface of the API, including sensitive fields such as UserHash. This issue is patched in version 8.4.2. There are no known workarounds.
|
[
"cpe:2.3:a:salesagility:suitecrm:8.4.1:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
GHSA-28vh-xppq-c3v4
|
LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the generate_conf_router function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-22771
|
Hitron Systems DVR LGUVR-4H Improper Input Validation Vulnerability
|
Improper Input Validation in Hitron Systems DVR LGUVR-4H 1.02~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
|
[
"cpe:2.3:o:hitronsystems:dvr_lguvr-4h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hitron_systems:dvr_hvr-4781_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hitron_systems:dvr_hvr-4781:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
CVE-2019-16455
|
Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-42w6-9898-chc9
|
The Business Card WordPress plugin through 1.0.0 does not prevent high privilege users like administrators from uploading malicious PHP files, which could allow them to run arbitrary code on servers hosting their site, even in MultiSite configurations.
|
[] | null | 7.2 | null | null | null |
|
GHSA-v5rr-4m5q-q852
|
Sony Micro Vault Fingerprint Access Software, as distributed with Sony Micro Vault USM-F USB flash drives, installs a driver that hides a directory under %WINDIR%, which might allow remote attackers to bypass malware detection by placing files in this directory.
|
[] | null | null | null | null | null |
|
GHSA-2mjv-mf39-rm6w
|
Directory traversal vulnerability in modules/aljazeera/admin/setup.php in Arab Portal 2.2 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module parameter.
|
[] | null | null | null | null | null |
|
GHSA-7g2j-gh73-wrxr
|
Out-of-bounds write in softsim TA prior to SMR Jan-2025 Release 1 allows local privileged attackers to cause memory corruption.
|
[] | null | 6.4 | null | null | null |
|
CVE-2023-0512
|
Divide By Zero in vim/vim
|
Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | null | null |
GHSA-g7hw-jh4p-75wr
|
TYPO3 Cross-Site Scripting in Filelist Module
|
It has been discovered that the output table listing in the “Files” backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences.Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability.
|
[] | null | 6.1 | null | null | null |
GHSA-q662-m56g-5hm7
|
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
|
[] | null | null | 5.5 | null | null |
|
GHSA-42jh-4jqc-82pf
|
PHP remote file inclusion vulnerability in module.php for ezContents allows remote attackers to execute arbitrary PHP code by modifying the link parameter to reference a URL on a remote web server that contains the code.
|
[] | null | null | null | null | null |
|
CVE-2022-23647
|
Cross-site Scripting in Prism
|
Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.
|
[
"cpe:2.3:a:prismjs:prism:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
CVE-2022-29929
|
In JetBrains TeamCity before 2022.04 potential XSS via Referrer header was possible
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | null | null |
|
RHSA-2019:2046
|
Red Hat Security Advisory: polkit security and bug fix update
|
polkit: Improper handling of user with uid > INT_MAX leading to authentication bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null | null |
CVE-2023-5849
|
Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-f4xr-4383-7g29
|
Cross-site scripting (XSS) vulnerability in QuickBlogger 1.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) author ("your name") and (2) "comment" section.
|
[] | null | null | null | null | null |
|
CVE-2004-1019
|
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
|
[
"cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2023:5245
|
Red Hat Security Advisory: linux-firmware security update
|
hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null | null |
GHSA-p3fw-7jpp-frg7
|
Certain WithSecure products have a buffer over-read whereby processing certain fuzz file types may cause a denial of service (DoS). This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 15 and later.
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-17120
|
Microsoft SharePoint Information Disclosure Vulnerability
|
Microsoft SharePoint Information Disclosure Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:foundation:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2014-0098
|
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:4.63:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-31373
|
SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Solar_AiConf.php.
|
[
"cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:contec:sv-cpt-mc310:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-36358
|
TP-Link TL-WR940N V2/V3/V4, TL-WR941ND V5/V6, TL-WR743ND V1 and TL-WR841N V8 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlAccessTargetsRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
|
[
"cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:v8:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr941nd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:v6:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr743nd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr743nd:v1:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
|
GHSA-rhh9-x7cc-27x3
|
The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
|
[] | null | null | null | null | null |
|
GHSA-pg97-ww7h-5mjr
|
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
|
Impact_What kind of vulnerability is it? Who is impacted?_Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.Patches_Has the problem been patched? What versions should users upgrade to?_Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:1.16.11.15.21.14.51.13.61.12.71.11.9Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.For more informationIf you have any questions or comments about this advisory:Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
|
[] | null | 6.1 | null | null | null |
GHSA-24wf-7vf2-pv59
|
XXE vulnerability on Launch import with externally-defined DTD file
|
ImpactStarting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.PatchesFixed with: https://github.com/reportportal/service-api/pull/1392Binaries`docker pull reportportal/service-api:5.4.0`
https://github.com/reportportal/service-api/packages/846871?version=5.4.0For more informationIf you have any questions or comments about this advisory email us: [[email protected]](mailto:[email protected])
|
[] | null | 7.5 | null | null | null |
GHSA-cjfg-wq59-q7v2
|
Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
|
[] | null | 9 | null | null | null |
|
GHSA-wv2h-444w-8xv6
|
The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications.
|
[] | null | null | null | null | null |
|
CVE-2022-2609
|
Use after free in Nearby Share in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2012-4651
|
Cisco IOS before 15.3(2)T, when scansafe is enabled, allows remote attackers to cause a denial of service (latency) via SYN packets that are not accompanied by SYN-ACK packets from the Scan Safe Tower, aka Bug ID CSCub85451.
|
[
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-93x6-prf7-8r9f
|
HTTP.sys Denial of Service Vulnerability
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-26148
|
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
|
[
"cpe:2.3:a:md4c_project:md4c:0.4.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-1752
|
Denial of Service in run-llama/llama_index
|
A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.
|
[] | null | null | 7.5 | null | null |
RHSA-2019:3082
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 5.2 | null | null |
GHSA-v8hr-pgg6-cf38
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[] | null | null | null | null | null |
|
CVE-2018-7176
|
FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the "add user" feature of the User Permissions page).
|
[
"cpe:2.3:a:frontaccounting:frontaccounting:2.4.3:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-24080
|
A lack of rate limiting on the password reset endpoint of Chamberlain myQ v5.222.0.32277 (on iOS) allows attackers to compromise user accounts via a bruteforce attack.
|
[
"cpe:2.3:a:chamberlain:myq:5.222.0.32277:*:*:*:*:iphone_os:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-rq86-9m6r-cm3g
|
SurrealDB has uncaught exception in Net module that leads to database crash
|
A vulnerability was found where an attacker can crash the database via crafting a HTTP query that returns a null byte. The problem relies on an uncaught exception in the `net` module, where the result of the query will be converted to JSON before showing as the HTTP response to the user in the **/sql** endpoint.ImpactThis vulnerability allows any authenticated user to crash a SurrealDB instance by sending a crafted query with a null byte to the /sql endpoint.Where SurrealDB is used as an application backend, it is possible that an application user can crash the SurrealDB instance and thus the supported application through crafted inputs that exploit this attack vector.PatchesA patch has been introduced that ensures the error is caught and converted as an error.Versions 2.2.2, 2.1.5 and 2.0.5 and later are not affected by this isssueWorkaroundsAffected users who are unable to update may want to limit the ability of untrusted clients to run arbitrary queries in the affected versions of SurrealDB. To limit the impact of the denial of service, SurrealDB administrators may also want to ensure that the SurrealDB process is running so that it can be automatically re-started after a crash.Where SurrealDB is used as an application backend, ensure sanitisation of input at the application layer to prevent injection attacks.Referenceshttps://github.com/surrealdb/surrealdb/pull/5647
|
[] | 7.1 | null | null | null | null |
CVE-2023-4471
|
The Order Tracking Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the start_date and end_date parameters in versions up to, and including, 3.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:etoilewebdesign:order_tracking:*:*:*:*:pro:wordpress:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2025-0456
|
NetVision Information airPASS - Missing Authentication
|
The airPASS from NetVision Information has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access the specific administrative functionality to retrieve * all accounts and passwords.
|
[] | null | 9.8 | null | null | null |
CVE-2008-0522
|
Cross-site scripting (XSS) vulnerability in multiple Hal Networks shopping-cart products allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:hal_networks:perl__cgi_cart:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hal_networks:php_cart:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hal_networks:shop_hal_v1:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-33496
|
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected SIMATIC RTLS Locating Manager Report Clients do not properly protect credentials that are used to authenticate to the server. This could allow an authenticated local attacker to extract the credentials and use them to escalate their access rights from the Manager to the Systemadministrator role.
|
[
"cpe:2.3:a:siemens:simatic_rtls_locating_manager:*:*:*:*:*:*:*:*"
] | 4.8 | 6.3 | null | null | null |
|
GHSA-rm5j-55hv-4q3p
|
arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
|
[] | null | null | null | null | null |
|
CVE-2010-0023
|
The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Local Privilege Elevation Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-3mpf-9cvv-qh7g
|
The Windows Installation component of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.5.0 and below, TIBCO ActiveSpaces - Developer Edition: versions 4.5.0 and below, and TIBCO ActiveSpaces - Enterprise Edition: versions 4.5.0 and below.
|
[] | null | null | null | null | null |
|
CVE-2025-6238
|
AI Engine 2.8.4 - Insecure OAuth Implementation
|
The AI Engine plugin for WordPress is vulnerable to open redirect in version 2.8.4. This is due to an insecure OAuth implementation, as the 'redirect_uri' parameter is missing validation during the authorization flow. This makes it possible for unauthenticated attackers to intercept the authorization code and obtain an access token by redirecting the user to an attacker-controlled URI. Note: OAuth is disabled, the 'Meow_MWAI_Labs_OAuth' class is not loaded in the plugin in the patched version 2.8.5.
|
[] | null | 8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.