id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-hgrw-f4vv-qw46 | A vulnerability classified as critical was found in GE Voluson S8. Affected is the underlying Windows XP operating system. Missing patches might introduce an excessive attack surface. Access to the local network is required for this attack to succeed. | [] | null | 7.8 | null | null |
|
CVE-2005-3527 | Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP. | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-pv5g-gpjf-g9xg | LSCFG in IBM AIX 5.2 and 5.3 does not create temporary files securely, which allows local users to corrupt /etc/passwd and possibly other system files via the trace file. | [] | null | null | null | null |
|
GHSA-xw3x-gmvv-p64m | Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere. | [] | null | null | null | null |
|
GHSA-c3cx-8mvg-g7xg | Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-4438, CVE-2015-4441, CVE-2015-4445, CVE-2015-4447, CVE-2015-4451, CVE-2015-4452, CVE-2015-5085, and CVE-2015-5086. | [] | null | null | null | null |
|
RHSA-2019:1269 | Red Hat Security Advisory: firefox security update | mozilla: Cross-origin theft of images with ImageBitmapRenderingContext chromium-browser: Out of bounds read in Skia libpng: use-after-free in png_image_free in png.c Mozilla: Cross-origin theft of images with createImageBitmap Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 Mozilla: Type confusion with object groups and UnboxedObjects Mozilla: Stealing of cross-domain images using canvas Mozilla: Compartment mismatch with fetch API Mozilla: Use-after-free of ChromeEventHandler by DocShell Mozilla: Use-after-free in XMLHttpRequest Mozilla: Use-after-free removing listeners in the event listener manager Mozilla: Buffer overflow in WebGL bufferdata on Linux Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
GHSA-2f34-vx7g-x3mg | OMICARD EDM’s API function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to access, modify, delete database or disrupt service. | [] | null | 9.8 | null | null |
|
CVE-2019-19282 | A vulnerability has been identified in OpenPCS 7 V8.1 (All versions), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd3), SIMATIC BATCH V8.1 (All versions), SIMATIC BATCH V8.2 (All versions < V8.2 Upd12), SIMATIC BATCH V9.0 (All versions < V9.0 SP1 Upd5), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd4), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC (TIA Portal) V15.1 (All versions < V15.1 Update 5), SIMATIC WinCC (TIA Portal) V16 (All versions < V16 Update 1), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 1). Through specially crafted messages, when encrypted communication is enabled, an attacker with network access could use the vulnerability to compromise the availability of the system by causing a Denial-of-Service condition.
Successful exploitation requires no system privileges and no user interaction. | [
"cpe:2.3:a:siemens:openpcs_7:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:openpcs_7:9.0_update_1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_net_pc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_net_pc:16:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:9.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:9.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_route_control:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_10:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_11:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_12:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_13:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_5:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_6:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_7:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_8:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_9:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:-:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2007-0060 | Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. | [
"cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_san_manager:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2007-2214 | Unrestricted file upload vulnerability in includes/upload_file.php in DmCMS allows remote attackers to upload arbitrary PHP scripts by placing a script's contents in both the File2 and File3 parameters, and sending a ok.php?do=act Referer. | [
"cpe:2.3:a:dmcms:dmcms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
ICSA-24-023-01 | APsystems Energy Communication Unit (ECU-C) Power Control Software | APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights. This could lead to multiple attacks in the product's range. | [] | null | 8.8 | null | null |
GHSA-f3ww-87xf-9498 | Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data. | [] | null | null | 9.8 | null |
|
CVE-2019-4298 | IBM Robotic Process Automation with Automation Anywhere 11 uses a high privileged PostgreSQL account for database access which could allow a local user to perform actions they should not have privileges to execute. IBM X-Force ID: 160764. | [
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 7.7 | null |
|
CVE-2023-49377 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/update. | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
RHSA-2013:0158 | Red Hat Security Advisory: tomcat6 security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
GHSA-cc5r-5c3q-fh45 | class.vfs_dav.inc.php in phpGroupWare 0.9.16.000 does not create .htaccess files to enable authorization checks for access to users' home-directory files, which allows remote attackers to obtain sensitive information from these files. | [] | null | null | null | null |
|
GHSA-wcv4-mvxp-h397 | An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 8 case. | [] | null | null | 5.5 | null |
|
GHSA-973m-857j-grqw | The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes. An attacker with access to create routes can potentially overwrite existing routes and redirect network traffic for other users to their own site. | [] | null | null | 7.7 | null |
|
RHSA-2022:4959 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) java-11-openj9,java-1_8_0-openj9: unverified methods can be invoked using MethodHandles OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
CVE-2004-1792 | swnet.dll in YaSoft Switch Off 2.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a long packet with two CRLF sequences to the service management port (TCP 8000). | [
"cpe:2.3:a:yatsoft:switch_off:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:yatsoft:switch_off:2.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jh89-gfwm-r5hg | Efone 20000723 stores config.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information. | [] | null | null | null | null |
|
GHSA-3fcf-gf78-2qgj | A CSRF vulnerability exists in the Upload Center Forms Component of Web File Manager in Rumpus FTP 8.2.9.1. This could allow an attacker to delete, create, and update the upload forms via RAPR/TriggerServerFunction.html. | [] | null | null | null | null |
|
CVE-2021-45473 | In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar). | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2023:1931 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
CVE-2001-0931 | Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET. | [
"cpe:2.3:a:cooolsoft:powerftp:2.03:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8xcf-7jjj-p7rh | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A buffer overflow existed in the vaultServer component. This was exploitable by a remote unauthenticated attacker. | [] | null | 9.8 | null | null |
|
GHSA-33rw-2cg2-2mpc | In the Linux kernel, the following vulnerability has been resolved:mm: revert "mm: shmem: fix data-race in shmem_getattr()"Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over
NFS.As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem". | [] | null | 4.7 | null | null |
|
CVE-2022-4436 | Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-8374 | Arbitrary Code Injection in Cura | UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases. | [
"cpe:2.3:a:ultimaker:cura:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.7.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc1:*:*:*:*:*:*",
"cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc2:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2017-12263 | A vulnerability in the web interface of Cisco License Manager software could allow an unauthenticated, remote attacker to download and view files within the application that should be restricted, aka Directory Traversal. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. An exploit could allow the attacker to view application files that may contain sensitive information. Cisco Bug IDs: CSCvd83577. | [
"cpe:2.3:a:cisco:license_manager:3.2.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-q5x8-3vm4-xrh9 | .NET Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
CVE-2024-44234 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:18.0:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-7xgj-rr5f-9wv9 | The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL. | [] | null | null | null | null |
|
RHSA-2014:1335 | Red Hat Security Advisory: python-django-horizon security and bug fix update | openstack-horizon: persistent XSS in Horizon Host Aggregates interface | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
CVE-2007-5981 | Lantronix SCS3200 does not properly handle public-key requests, which allows remote attackers to cause a denial of service (unresponsive device) via unspecified keyscan requests. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:h:lantronix:scs3200:*:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
GHSA-342w-jw3g-59cj | steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data. | [] | null | 7.5 | null | null |
|
GHSA-hx54-chxq-7878 | Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N. | [] | null | null | null | null |
|
GHSA-wfcg-m45x-v8xf | Buffer overflow in the key exchange functionality in Icon Labs Iconfidant SSL Server before 1.3.0 allows remote attackers to execute arbitrary code via a client master key packet in which the sum of unspecified length fields is greater than a certain value. | [] | null | null | null | null |
|
GHSA-75jg-xqjf-hxq8 | Multiple PHP remote file inclusion vulnerabilities in interact 2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[BASE_PATH] parameter in (a) admin/autoprompter.php and (b) includes/common.inc.php, and the (2) CONFIG[LANGUAGE_CPATH] parameter in (c) admin/autoprompter.php. | [] | null | null | null | null |
|
CVE-2023-35754 | D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20082. | [
"cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-4545-9hjr-7769 | The BOOTPD component in Enterasys NetSight Console 2.1 and NetSight Inventory Manager 2.1, and possibly earlier, on Windows allows remote attackers to cause a denial of service (daemon crash) via a UDP packet that contains an invalid "packet type" field. | [] | null | null | null | null |
|
CVE-2024-2822 | DedeCMS vote_edit.php cross-site request forgery | A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/vote_edit.php. The manipulation of the argument aid leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257709 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 5 |
GHSA-3pxq-4mq2-m2mc | The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to execute arbitrary commands via shell metacharacters. | [] | null | null | null | null |
|
GHSA-93mm-w2p9-c6mq | Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. | [] | null | null | null | null |
|
CVE-2019-8579 | An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2022:1013 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update | guava: local information disclosure via temporary directory created with unsafe permissions bouncycastle: Timing issue within the EC math library mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data maven: Block repositories using http by default jersey: Local information disclosure via system temporary directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way xml-security: XPath Transform abuse allows for information disclosure cron-utils: template Injection leading to unauthenticated Remote Code Execution h2: Remote Code Execution in Console | [
"cpe:/a:redhat:camel_quarkus:2.2.1"
] | null | 9.8 | null | null |
GHSA-6ccc-xf3v-r6w3 | The mama.cn (aka cn.ziipin.mama.ui) application 1.02 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-8hwp-gqff-c4f8 | Unrestricted file upload vulnerability in Collabtive 0.4.8 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and using a text/plain MIME type, then accessing it via a direct request to the file in files/, related to (1) the showproject action in managefile.php or (2) the Messages feature. | [] | null | null | null | null |
|
CVE-2012-2010 | The ACMELOGIN implementation in HP OpenVMS 8.3 and 8.4 on the Alpha platform, and 8.3, 8.3-1H1, and 8.4 on the Itanium platform, when the SYS$ACM system service is enabled, allows local users to gain privileges via unspecified vectors. | [
"cpe:2.3:o:hp:openvms:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.3:*:alpha:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.3-1h1:*:integrity_servers:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.4:*:alpha:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.4:*:itanium:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-wxmm-ppfr-m8cp | Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX. | [] | null | null | null | null |
|
GHSA-4rrg-w6rp-6fcw | A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623. | [] | null | null | 7.8 | null |
|
GHSA-f9j2-hv33-h2gp | An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality. | [] | null | 7.8 | null | null |
|
CVE-2024-53989 | Possible XSS vulnerability with certain configurations of rails-html-sanitizer 1.6.0 | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags for the the "noscript" element. This vulnerability is fixed in 1.6.1. | [] | 2.3 | null | null | null |
RHSA-2024:10705 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
GHSA-fc44-mphx-vpc6 | Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments. | [] | null | null | null | null |
|
CVE-2024-50465 | WordPress Premium SEO Pack plugin <= 1.6.001 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP SEO – Calin Vingan Premium SEO Pack allows SQL Injection.This issue affects Premium SEO Pack: from n/a through 1.6.001. | [
"cpe:2.3:a:squirrly:premium_seo_pack:*:*:*:*:*:wordpress:*:*"
] | null | 8.5 | null | null |
CVE-2008-1035 | Use-after-free vulnerability in Apple iCal 3.0.1 on Mac OS X allows remote CalDAV servers, and user-assisted remote attackers, to trigger memory corruption or possibly execute arbitrary code via an "ATTACH;VALUE=URI:S=osumi" line in a .ics file, which triggers a "resource liberation" bug. NOTE: CVE-2008-2007 was originally used for this issue, but this is the appropriate identifier. | [
"cpe:2.3:a:apple:ical:3.0.1:*:os_x:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-m893-jcpr-3937 | A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types. | [] | null | null | null | null |
|
GHSA-w254-6wjf-3v8j | Uebimiau Webmail allows remote attackers to obtain sensitive information via a request to demo/pop3/error.php with an invalid value of the (1) smarty or (2) selected_theme parameter, which reveals the path in various error messages. | [] | null | null | null | null |
|
CVE-2024-57655 | An issue in the dfe_n_in_order component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] | null | 7.5 | null | null |
|
CVE-2022-49386 | net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks | In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks
of_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
am65_cpsw_init_cpts() and am65_cpsw_nuss_probe() don't release
the refcount in error case.
Add missing of_node_put() to avoid refcount leak. | [] | null | 5.5 | null | null |
GHSA-p7qv-f46f-46p7 | The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below. | [] | null | null | null | null |
|
GHSA-r9p6-cffj-3xwp | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Federation). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Access Manager. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). | [] | null | null | null | null |
|
GHSA-g2v3-62rj-h6p6 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | [] | null | 6.5 | null | null |
|
GHSA-2cj3-wx97-62jm | The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-7397-v773-mg5p | Missing authentication for the remote configuration port 1236/tcp on the Cohu 3960HD allows an attacker to change configuration parameters such as IP address and username/password via specially crafted XML SOAP packets. | [] | null | null | 9.8 | null |
|
CVE-2005-2041 | Buffer overflow in addschup in HAURI ViRobot 2.0, and possibly other products, allows remote attackers to execute arbitrary code via a long ViRobot_ID cookie (HTTP_COOKIE). | [
"cpe:2.3:a:hauri:virobot_linux_server:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-41953 | WordPress ProfilePress plugin <= 4.13.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress.This issue affects ProfilePress: from n/a through 4.13.1. | [
"cpe:2.3:a:profilepress:profilepress:*:*:*:*:pro:wordpress:*:*"
] | null | 5.3 | null | null |
RHSA-2024:1941 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
GHSA-wgvx-9rh5-4g4m | Jenkins Benchmark Evaluator Plugin vulnerable to cross-site request forgery | Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [] | null | 8.8 | null | null |
GHSA-wh82-w6g6-vr7h | Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet. | [] | null | null | null | null |
|
GHSA-r6qf-x4mq-x26g | Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer. | [] | null | null | 9.8 | null |
|
GHSA-x75j-f3wm-2gwg | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-33mg-w6qx-r88m | Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make the device access invalid memory and might reset a process. | [] | null | null | 4.3 | null |
|
GHSA-x2h2-gcv9-w3gx | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-7vmr-cgfv-q59w | Google Chrome before 15.0.874.102 does not properly handle javascript: URLs, which allows remote attackers to bypass intended access restrictions and read cookies via unspecified vectors. | [] | null | null | null | null |
|
CVE-2022-25413 | Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3. | [
"cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2016-2870 | Buffer overflow in the CLI on IBM WebSphere DataPower XC10 appliances 2.1 and 2.5 allows remote authenticated users to cause a denial of service via unspecified vectors. | [
"cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.5:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:websphere_datapower_xc10_appliance:-:*:*:*:*:*:*:*"
] | null | null | 2.7 | 5 |
|
CVE-2013-6206 | Unspecified vulnerability in HP Rapid Deployment Pack (RDP) and Insight Control Server Deployment allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors. | [
"cpe:2.3:a:hp:insight_control_server_deployment:-:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:rapid_deployment_pack:-:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2025-0172 | code-projects Chat System deleteroom.php sql injection | A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/deleteroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2004-0594 | The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete. | [
"cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-g2vw-843m-4hr9 | The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. | [] | null | null | null | null |
|
CVE-2012-4923 | Multiple cross-site scripting (XSS) vulnerabilities in Endian Firewall 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) createrule parameter to dnat.cgi, (2) addrule parameter to dansguardian.cgi, or (3) PATH_INFO to openvpn_users.cgi. | [
"cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-2965 | Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
RHSA-2025:1130 | Red Hat Security Advisory: OpenShift Container Platform 4.15.45 packages and security update | jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 6.3 | null | null |
CVE-2023-38306 | An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code. | [
"cpe:2.3:a:webmin:webmin:2.021:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-4w29-23fj-v8v5 | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects R7500v2 before 1.0.3.20, R7800 before 1.0.2.38, WN3000RPv3 before 1.0.2.50, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50. | [] | null | null | null | null |
|
CVE-2024-37490 | WordPress Bard theme <= 2.210 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Bard allows Cross Site Request Forgery.This issue affects Bard: from n/a through 2.210. | [] | null | 4.3 | null | null |
CVE-2016-1176 | Buffer overflow in the ActiveX control in Sharp EVA Animeter allows remote attackers to execute arbitrary code via a crafted web page. | [
"cpe:2.3:a:sharp:eva_animator:-:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.8 |
|
CVE-2010-3957 | Double free vulnerability in the OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Double Free Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | 7.3 | null | 6.9 |
|
RHSA-2022:0237 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
CVE-2000-0652 | IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. | [
"cpe:2.3:a:ibm:websphere_application_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:3.0.21:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-x52f-h74p-9jh8 | node-sqlite is malware | The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] | null | null | 7.5 | null |
CVE-2007-1603 | admin/contest.php in Weekly Drawing Contest 0.0.1 allows remote attackers to bypass authentication, and insert new contest information into a database, via a direct POST request. | [
"cpe:2.3:a:weekly_drawing_contest:weekly_drawing_contest:0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-27372 | An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on disc_attr->infrastructure_ssid_len coming from userspace, which can lead to a heap overwrite. | [
"cpe:2.3:o:samsung:exynos_850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-q87w-hjgf-6vfw | Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1. | [] | null | 4.9 | null | null |
|
GHSA-qjxf-mc72-wjr2 | Devise-Two-Factor Authentication Uses Insufficient Default OTP Shared Secret Length | SummaryUnder the default configuration, Devise-Two-Factor versions 1.0.0 or >= 4.0.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by [RFC 4226](https://datatracker.ietf.org/doc/html/rfc4226). Using a shared secret shorter than the minimum to generate a multi-factor authentication code could make it easier for an attacker to guess the shared secret and generate valid TOTP codes.RemediationDevise-Two-Factor should be upgraded to version v6.0.0 as soon as possible. After upgrading, the length of shared secrets and TOTP URLs generated by the library will increase since the new shared secrets will be longer.If upgrading is not possible, you can override the default `otp_secret_length` attribute in the model when configuring `two_factor_authenticable` and set it to a value of at least 26 to ensure newly generated shared secrets are at least 128-bits long.After upgrading or implementing the workaround, applications using Devise-Two-Factor may wish to migrate users to the new OTP length to provide increased protection for those accounts. Turning off OTP for users by setting `otp_required_for_login` to false is not recommended since it would leave accounts unprotected. However, you may wish to implement application logic that checks the length of a user's shared secret and prompts users to re-enroll in OTP.BackgroundDevise-Two-Factor uses [ROTP](https://github.com/mdp/rotp) to generate shared secrets for TOTP. In ROTP < 5.0.0, the first argument to the `ROTP::Base32#random_base32` function represented the number of bytes to read from SecureRandom which were then returned as a base32-encoded string. In ROTP 5.1.0, this function was changed so that the first argument now represents the length of the base32-encoded string returned by the function instead of the number of bytes to read from SecureRandom resulting in a shorter key being generated for the same input value. (https://github.com/mdp/rotp/commit/15d5104e3cb99f97d36c772f8f09cf7e2e77de20). | [] | 6 | 5.3 | null | null |
cisco-sa-ftd-statcred-dFC8tXT5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials.
This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"]. | [] | null | 9.3 | null | null |
CVE-2021-43858 | User privilege escalation in MinIO | MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users. | [
"cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-w3xp-69rr-q6gw | A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions.
*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129. | [] | null | 8.1 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.