id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2018-3951 | An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:tp-link:tl-r600vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-r600vpn:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
GHSA-fx5c-4j3x-4pc6 | DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php. | [] | null | null | null | null |
|
GHSA-6rv3-q74h-h7v3 | The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. | [] | null | 9.8 | null | null |
|
CVE-2024-45113 | ColdFusion | Improper Authentication (CWE-287) | ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access and affect the integrity of the application. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2024-27133 | Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. | Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields. | [
"cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-f69p-jvr2-8j5x | kodbox 1.2.x through 1.3.7 has a Sensitive Information Leakage issue. | [] | null | 7.5 | null | null |
|
ICSA-22-349-01 | Prosys OPC UA Simulation Server (Update A) | Prosys OPC UA Simulation server v5.03-64 does not sufficiently protect credentials, which could allow an attacker to obtain user credentials and gain access to system data. CVE-2022-2967 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 6.5 | null |
CVE-2024-13747 | WooMail - WooCommerce Email Customizer <= 3.0.34 - Authenticated (Subscriber+) Missing Authorization to SQL Injection | The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query. | [] | null | 4.3 | null | null |
GHSA-p82h-r998-fmm5 | In ape extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561391; Issue ID: ALPS05561391. | [] | null | null | null | null |
|
GHSA-8rpj-mgcc-4hwx | A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7. | [] | null | null | null | null |
|
GHSA-m8mv-xfjj-7m87 | An issue was discovered on NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to command injection via the 2.4 GHz and 5 GHz name parameters, allowing a remote attacker to execute arbitrary OS commands on the device (with root-level permissions) via crafted input. | [] | null | 4.8 | null | null |
|
GHSA-jpqr-vh55-xqxf | Apache Tomcat Buffer Over-Read | The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the `ajp_process_callback` in mod_jk, which allows remote attackers to read portions of sensitive memory. | [] | null | null | null | null |
GHSA-gc9v-rxqh-j677 | IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 220041. | [] | null | 4.8 | null | null |
|
GHSA-4g73-w34j-p4w5 | Movie Seat Reservation v1 was discovered to contain an unauthenticated file disclosure vulnerability via /index.php?page=home. | [] | null | 7.5 | null | null |
|
GHSA-62gj-gx39-jgj7 | An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS system, including the server’s functionality for handling file uploads and the associated validation processes. | [] | null | null | null | null |
|
CVE-2008-4943 | bulmages-servers 0.11.1 allows local users to overwrite arbitrary files via a symlink attack on the (a) /tmp/error.txt, (b) /tmp/errores.txt, and possibly other temporary files, related to the (1) creabulmafact, (2) creabulmacont, and possibly (3) actualizabulmacont, (4) installbulmages-db, and (5) actualizabulmafact scripts. | [
"cpe:2.3:a:iglues:bulmages-servers:0.11.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
ICSA-20-154-05 | GE Grid Solutions Reason RT Clocks | The device 's vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.CVE-2020-12017 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H). | [] | null | null | 9.6 | null |
CVE-2024-5798 | Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims | Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.
This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9 | [] | null | 2.6 | null | null |
CVE-2023-21389 | In Settings, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2025-31139 | In JetBrains TeamCity before 2025.03 base64 encoded password could be exposed in build log | [] | null | 4.3 | null | null |
|
GHSA-28x6-9x2p-p6mq | Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages." | [] | null | null | null | null |
|
CVE-2024-47825 | CIDR deny policies may not take effect when a more narrow CIDR allow is present | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.16 and 1.15.10, a policy rule denying a prefix that is broader than `/32` may be ignored if there is a policy rule referencing a more narrow prefix (`CIDRSet` or `toFQDN`) and this narrower policy rule specifies either `enableDefaultDeny: false` or `- toEntities: all`. Note that a rule specifying `toEntities: world` or `toEntities: 0.0.0.0/0` is insufficient, it must be to entity `all`.This issue has been patched in Cilium v1.14.16 and v1.15.10. As this issue only affects policies using `enableDefaultDeny: false` or that set `toEntities` to `all`, some workarounds are available. For users with policies using `enableDefaultDeny: false`, remove this configuration option and explicitly define any allow rules required. For users with egress policies that explicitly specify `toEntities: all`, use `toEntities: world`. | [
"cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*"
] | null | 4 | null | null |
CVE-2023-51011 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanPriDns parameter’ of the setLanConfig interface of the cstecgi .cgi | [
"cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2009-2460 | Multiple stack-based buffer overflows in mathtex.cgi in mathTeX, when downloaded before 20090713, have unspecified impact and remote attack vectors. | [
"cpe:2.3:a:forkosh:mathtex:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-6jr9-mp6v-mh4x | IBM WebSphere Application Server (WAS) 8.0.x before 8.0.0.10 and 8.5.x before 8.5.5.3, when Load Balancer for IPv4 Dispatcher is enabled, allows remote attackers to cause a denial of service (Load Balancer crash) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-v42f-j8fx-99f3 | Queue<T> should have a Send bound on its Send/Sync traits | Affected versions of this crate unconditionally implements `Send`/`Sync` for `Queue<T>`.This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior. | [] | null | null | null | null |
GHSA-h2mj-pqgp-xmmj | A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. | [] | null | 7.5 | null | null |
|
GHSA-j6g4-w2h4-mv5j | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: JNDI). Supported versions that are affected are 10.3.6.0 and 12.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 10 | null |
|
CVE-2022-36301 | BF-OS version 3.x up to and including 3.83 do not enforce strong passwords which may allow a remote attacker to brute-force the device password. | [
"cpe:2.3:o:bosch:bf-os:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2022-37070 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList. | [
"cpe:2.3:o:h3c:gr-1200w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:gr-1200w:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-vh56-6f64-v877 | Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 provides read and write access to the PCI configuration space of the device. | [] | null | 7.8 | null | null |
|
CVE-2024-21434 | Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability | Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-rp2c-496x-gf5c | In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4 and 8.3RX before 8.3R7.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2 and 5.4RX before 5.4R7.1, an unauthenticated, remote attacker can conduct a session hijacking attack. | [] | null | 9.8 | null | null |
|
GHSA-4244-mrv4-7597 | Multiple cross-site request forgery (CSRF) vulnerabilities in password.php in PHPmotion 2.1 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests that modify an account via the (1) password or (2) email_address parameter. | [] | null | null | null | null |
|
CVE-2020-4432 | Certain IBM Aspera applications are vulnerable to command injection after valid authentication, which could allow an attacker with intimate knowledge of the system to execute commands in a SOAP API. IBM X-Force ID: 180810. | [
"cpe:2.3:a:ibm:aspera_application_platform_on_demand:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_faspex_on_demand:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_high-speed_transfer_endpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_high-speed_transfer_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_high-speed_transfer_server_for_cloud_pak_for_integration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_proxy_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_server_on_demand:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares_on_demand:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_streaming:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_transfer_cluster_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-mjj5-jqj3-25q9 | The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files. | [] | null | null | null | null |
|
CVE-2012-1384 | Unspecified vulnerability in the NetEase Pmail (com.netease.rpmms) application 0.5.0 and 0.5.2 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:netease:netease_pmail:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netease:netease_pmail:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-46x7-62h2-v4mm | SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the chart title resulting in reflected Cross-Site Scripting | [] | null | 5.4 | null | null |
|
ICSA-21-266-01 | Trane Symbio (Update B) | The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.CVE-2021-38448 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H). | [] | null | null | 7.5 | null |
CVE-2019-8659 | This issue was addressed with improved checks. This issue is fixed in watchOS 5.3. Users removed from an iMessage conversation may still be able to alter state. | [
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
PYSEC-2020-14 | null | An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable. | [] | null | null | null | null |
CVE-2022-34868 | WordPress ЮKassa для WooCommerce plugin <= 2.3.0 - Authenticated Arbitrary Settings Update vulnerability | Authenticated Arbitrary Settings Update vulnerability in YooMoney ЮKassa для WooCommerce plugin <= 2.3.0 at WordPress. | [
"cpe:2.3:a:yookassa:yukassa_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-rg8g-m8wh-j728 | An elevation of privilege vulnerability in the Android media framework (libaudiopolicymanager). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64340921. | [] | null | null | 7.8 | null |
|
CVE-2022-38296 | Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager. | [
"cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-4q3g-xq49-mpmw | Cross-site scripting (XSS) vulnerability in index.pl in Open Ticket Request System (OTRS) 2.0.x allows remote attackers to inject arbitrary web script or HTML via the Subaction parameter in an AgentTicketMailbox Action. NOTE: DEBIAN:DSA-1299 originally used this identifier for an ipsec-tools issue, but the proper identifier for the ipsec-tools issue is CVE-2007-1841. | [] | null | null | null | null |
|
CVE-2012-4836 | Cross-site scripting (XSS) vulnerability in IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted string that is not properly handled during rendering of stored data. | [
"cpe:2.3:a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-3g9q-pxcf-xr75 | A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component MODE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-w7jr-f865-r43v | admin/index.php in oBlog allows remote attackers to conduct brute-force password guessing attacks via HTTP requests. | [] | null | null | null | null |
|
CVE-2024-29120 | Apache StreamPark: Information leakage vulnerability | In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, salt value, etc.
Mitigation:
all users should upgrade to 2.1.4 | [] | null | 5.9 | null | null |
GHSA-9556-8jgg-j6p9 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-categories.php by adding a question mark (?) followed by the payload. | [] | null | 4.8 | null | null |
|
CVE-2024-23849 | In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2023:0468 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | ArgoCD: JWT audience claim is not verified | [
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 8.8 | null | null |
GHSA-593c-xgp7-3qpp | Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message. | [] | null | null | null | null |
|
GHSA-8fqm-6hfr-ppwc | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "fromGetWirelessRepeat." | [] | null | 9.8 | null | null |
|
CVE-2017-11816 | The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-77x4-55q7-4vmj | Apache HugeGraph-Hubble: SSRF in Hubble connection page | Server-Side Request Forgery (SSRF) vulnerability in Apache HugeGraph-Hubble. This issue affects Apache HugeGraph-Hubble: from 1.0.0 before 1.3.0.Users are recommended to upgrade to version 1.3.0, which fixes the issue. | [] | null | 5.3 | null | null |
CVE-2018-11982 | In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 8.3 |
|
CVE-2024-43796 | express vulnerable to XSS via response.redirect() | Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. | [
"cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:*"
] | null | 5 | null | null |
CVE-2020-20949 | Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure. | [
"cpe:2.3:a:st:stm32cubef0:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubef1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubef2:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubef3:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubef4:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubef7:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubeg0:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubeg4:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubeh7:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubeide:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubel0:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubel1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubel4:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubel4\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubel5:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubemonitor:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubemp1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubemx:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubeprogrammer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubewb:-:*:*:*:*:*:*:*",
"cpe:2.3:a:st:stm32cubewl:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ietf:public_key_cryptography_standards_\\#1:1.5:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
CVE-2012-6112 | classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string. | [
"cpe:2.3:a:tinymce:spellchecker_php:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:spellchecker_php:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5rjr-j9m9-qpm9 | A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | null | 8.8 | null | null |
|
GHSA-jv9r-mgx5-pqq6 | Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI. | [] | null | null | null | null |
|
GHSA-qq74-54g4-qw47 | A Cross-site Scripting (XSS) vulnerability in the J-Web component of Juniper Networks Junos OS allows an unauthenticated attacker to run malicious scripts reflected off of J-Web to the victim's browser in the context of their session within J-Web. This issue affects Juniper Networks Junos OS all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. | [] | null | 6.1 | null | null |
|
GHSA-r5fm-h248-qf2j | The SNMP Trap Agent service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (core dump and service restart) via a series of malformed UDP packets, as demonstrated by the IP Stack Integrity Checker (ISIC), aka Bug ID CSCsj24113. | [] | null | null | null | null |
|
GHSA-pvqf-f4m8-593f | Stage-2 fault will occur while writing to an ION system allocation which has been assigned to non-HLOS memory which is non-standard in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MSM8953, QCN7605, QCS605, SC8180X, SDA845, SDM429, SDM439, SDM450, SDM632, SDX20, SDX24, SDX55, SM8150, SXR1130 | [] | null | null | null | null |
|
GHSA-jg3q-ww74-69wg | Snapgear Lite+ firewall 1.5.4 and 1.5.3 allows remote attackers to cause a denial of service (crash) via a large number of connections to (1) the HTTP web management port, or (2) the PPTP port. | [] | null | null | null | null |
|
RHSA-2013:1268 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.9) (MFSA 2013-76) Mozilla: Use-after-free in Animation Manager during stylesheet cloning (MFSA 2013-79) Mozilla: Calling scope for new Javascript objects can lead to memory corruption (MFSA 2013-82) Mozilla: Compartment mismatch re-attaching XBL-backed nodes (MFSA 2013-88) Mozilla: Buffer overflow with multi-column, lists, and floats (MFSA 2013-89) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: User-defined properties on DOM proxies get the wrong "this" object (MFSA 2013-91) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2024-47176 | cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. | [
"cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2023-28017 | HCL Connections is vulnerable to cross-site scripting | HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user after visiting the vulnerable URL which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise a user's account then launch other attacks.
| [
"cpe:2.3:a:hcltech:connections:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:connections:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-5359-92wf-c9gq | An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern. | [] | null | null | 10 | null |
|
GHSA-m5vr-h7fw-fcf2 | cPanel before 80.0.22 allows remote code execution by a demo account because of incorrect URI dispatching (SEC-501). | [] | null | null | null | null |
|
CVE-2023-25222 | A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c. | [
"cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2020-5775 | Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains. | [
"cpe:2.3:a:instructure:canvas_learning_management_service:2020-07-29:*:*:*:*:*:*:*"
] | null | 5.8 | null | 5 |
|
GHSA-gg2f-5qcm-2x9p | A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269164. | [] | 6.9 | 7.3 | null | null |
|
CVE-2018-15417 | Cisco Webex Network Recording Player and Cisco Webex Player Remote Code Execution Vulnerabilities | A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. | [
"cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release5_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_32:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_33:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
CVE-2007-4656 | backup-manager-upload in Backup Manager before 0.6.3 provides the FTP server hostname, username, and password as plaintext command line arguments during FTP uploads, which allows local users to obtain sensitive information by listing the process and its arguments, a different vulnerability than CVE-2007-2766. | [
"cpe:2.3:a:backup_manager:backup_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
RHSA-2023:0630 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates | nodejs-minimatch: ReDoS via the braceExpand function golang: crypto/tls: session tickets lack random ticket_age_add crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements luxon: Inefficient regular expression complexity in luxon.js | [
"cpe:/a:redhat:acm:2.7::el8"
] | null | 7.5 | null | null |
GHSA-3f6x-6xxh-4m9v | In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2018-9040 | In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win10_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060c4. | [
"cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 |
|
GHSA-g559-2fpc-qhgf | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Unsubscribe). | [] | null | null | null | null |
|
GHSA-jhcv-c76w-jfvj | The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [] | null | null | null | null |
|
CVE-2001-0170 | glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files. | [
"cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:ecommerce:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:graficas:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-2895-67p4-w37q | Unspecified vulnerability in Futomi's CGI Cafe KMail CGI 1.0.3 and earlier allows remote attackers to bypass authentication and obtain unauthorized email access via unspecified vectors. | [] | null | null | null | null |
|
GHSA-qm59-f7vh-3m2p | A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. | [] | null | 3.9 | null | null |
|
GHSA-hqq7-j9qc-g7j5 | JBossWeb Bayeux has reflected XSS | [] | null | null | null | null |
|
GHSA-f825-f98c-gj3g | automattic/mongoose vulnerable to Prototype pollution via Schema.path | Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack. | [] | null | 7 | null | null |
CVE-2021-43838 | Regular Expression Denial of Service (ReDoS) in jsx-slack | jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible. | [
"cpe:2.3:a:jsx-slack_project:jsx-slack:*:*:*:*:*:node.js:*:*"
] | null | 5.3 | null | null |
CVE-2025-25468 | FFmpeg git-master before commit d5873b was discovered to contain a memory leak in the component libavutil/mem.c. | [] | null | 6.5 | null | null |
|
CVE-2021-2262 | Vulnerability in the Oracle Purchasing product of Oracle E-Business Suite (component: Endeca). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Purchasing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Purchasing accessible data as well as unauthorized access to critical data or complete access to all Oracle Purchasing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:purchasing:12.1.3:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2022-3440 | Rock Convert < 2.6.0 - Reflected Cross-Site Scripting | The Rock Convert WordPress plugin before 2.11.0 does not sanitise and escape an URL before outputting it back in an attribute when a specific widget is present on a page, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:rockcontent:rock_convert:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
GHSA-2898-phr2-m6mc | An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change a user's password. Also this is a systemic issue. | [] | null | null | 8.8 | null |
|
GHSA-28ff-x3xj-mx7q | An information disclosure vulnerability in libstagefright in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Android ID: A-31091777. | [] | null | null | 5.5 | null |
|
GHSA-h55v-q2qg-8h8m | An unsafe authentication interface was discovered in Smart Battery A4, a multifunctional portable charger, firmware version ?<= r1.7.9 . An attacker can bypass authentication without modifying device file and gain web page management privilege. | [] | null | null | null | null |
|
CVE-2024-36383 | An issue was discovered in Logpoint SAML Authentication before 6.0.3. An attacker can place a crafted filename in the state field of a SAML SSO-URL response, and the file corresponding to this filename will ultimately be deleted. This can lead to a SAML Authentication login outage. | [] | null | 5.3 | null | null |
|
GHSA-f7j8-j35p-xgv9 | Unrestricted file upload vulnerability in uploadrequest.asp in Layton HelpBox 3.7.1 allows remote authenticated users to upload and execute arbitrary ASP files, related to not properly checking file extensions. | [] | null | null | null | null |
|
CVE-2020-20663 | libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c. | [
"cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2022-24563 | In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters. | [
"cpe:2.3:a:metalgenix:genixcms:1.1.11:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
RHSA-2023:2029 | Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update | go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8"
] | null | 7.3 | null | null |
GHSA-cqg6-36p8-qxg8 | A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values, aka "Connected User Experiences and Telemetry Service Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. | [] | null | null | 5.5 | null |
|
GHSA-xx89-xmcq-2q77 | IBM WebSphere Partner Gateway (WPG) 6.1.0 before 6.1.0.1 and 6.1.1 before 6.1.1.1 allows remote authenticated users to obtain sensitive information via vectors related to the "schema DB2 instance id" and the bcgarchive (aka the archiver script). | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.