id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-8395 | PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392. | [
"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-32664 | A type confusion vulnerability exists in the Javascript checkThisBox method as implemented in Foxit Reader 12.1.2.15332. Specially crafted Javascript code inside a malicious PDF document can cause memory corruption and lead to remote code execution. User would need to open a malicious file to trigger the vulnerability. | [
"cpe:2.3:a:foxit:pdf_reader:12.1.2.15332:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-p88q-qx6q-mhv3 | The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. | [] | null | null | null | null |
|
GHSA-rrxc-83pc-mr58 | In the Linux kernel, the following vulnerability has been resolved:hwrng: cavium - fix NULL but dereferenced coccicheck errorFix following coccicheck warning:
./drivers/char/hw_random/cavium-rng-vf.c:182:17-20: ERROR:
pdev is NULL but dereferenced. | [] | null | 5.5 | null | null |
|
CVE-2018-11345 | An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system. | [
"cpe:2.3:o:asustor:as6202t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asustor:as6202t:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
RHSA-2021:0428 | Red Hat Security Advisory: OpenShift Container Platform 4.5.33 bug fix and security update | openshift/builder: privilege escalation during container image builds via mounted secrets | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.8 | null | null |
GHSA-9p6g-5797-v553 | In the Linux kernel, the following vulnerability has been resolved:ipv6: sr: fix memleak in seg6_hmac_init_algoseg6_hmac_init_algo returns without cleaning up the previous allocations
if one fails, so it's going to leak all that memory and the crypto tfms.Update seg6_hmac_exit to only free the memory when allocated, so we can
reuse the code directly. | [] | null | 5.5 | null | null |
|
CVE-2021-3118 | EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:medicalexpo:ecs_imaging:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2016-1070 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1051, CVE-2016-1052, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1067, CVE-2016-1068, CVE-2016-1069, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, CVE-2016-4102, and CVE-2016-4107. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2022-4525 | National Sleep Research Resource sleepdata.org cross site scripting | A vulnerability has been found in National Sleep Research Resource sleepdata.org up to 58.x and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 59.0.0.rc is able to address this issue. The name of the patch is da44a3893b407087829b006d09339780919714cd. It is recommended to upgrade the affected component. The identifier VDB-215905 was assigned to this vulnerability. | [
"cpe:2.3:a:sleepdata:sleepdata:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | null |
GHSA-4qxc-98vx-fp5g | Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [] | null | 5.4 | null | null |
|
GHSA-9888-hh6w-x446 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control. | [] | null | null | null | null |
|
GHSA-p6r7-6fjq-fqmc | Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors. | [] | null | null | null | null |
|
GHSA-hg42-ggpx-469x | Directory traversal vulnerability in Oxide WebServer allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in an HTTP request. | [] | null | null | null | null |
|
CVE-2023-33163 | Windows Network Load Balancing Remote Code Execution Vulnerability | Windows Network Load Balancing Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-6f28-hc9r-pqv2 | Multiple cross-site scripting (XSS) vulnerabilities in OpenNMS before 1.12.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-48795 | The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*",
"cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*",
"cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:matez:jsch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jadaptive:maverick_synergy_java_ssh_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
"cpe:2.3:o:thorntech:sftp_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:connectbot:sshlib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:sshd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:sshj:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tinyssh:tinyssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trilead:ssh2:6401:*:*:*:*:*:*:*",
"cpe:2.3:a:9bis:kitty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:security:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
CVE-2017-15384 | rate-me.php in Rate Me 1.0 has XSS via the id field in a rate action. | [
"cpe:2.3:a:phpjabbers:rate_me:1.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-54x8-9249-g4m3 | Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point." | [] | null | null | null | null |
|
CVE-2008-3903 | Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames. | [
"cpe:2.3:a:asterisk:p_b_x:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:p_b_x:1.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:p_b_x:1.4.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:p_b_x:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:trixbox:pbx:2.6.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-wx8m-rrw2-wqmw | WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | [] | null | null | null | null |
|
CVE-2023-2738 | Tongda OA GatewayController.php actionGetdata unrestricted upload | A vulnerability classified as critical has been found in Tongda OA 11.10. This affects the function actionGetdata of the file GatewayController.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:tongda2000:tongda_office_anywhere:11.10:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2017-6473 | In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-h97w-34cr-4pxx | In the Linux kernel, the following vulnerability has been resolved:clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic contextThe following bug report happened with a PREEMPT_RT kernel:BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
get_random_u32+0x4f/0x110
clocksource_verify_choose_cpus+0xab/0x1a0
clocksource_verify_percpu.part.0+0x6b/0x330
clocksource_watchdog_kthread+0x193/0x1a0It is due to the fact that clocksource_verify_choose_cpus() is invoked with
preemption disabled. This function invokes get_random_u32() to obtain
random numbers for choosing CPUs. The batched_entropy_32 local lock and/or
the base_crng.lock spinlock in driver/char/random.c will be acquired during
the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot
be acquired in atomic context.Fix this problem by using migrate_disable() to allow smp_processor_id() to
be reliably used without introducing atomic context. preempt_disable() is
then called after clocksource_verify_choose_cpus() but before the
clocksource measurement is being run to avoid introducing unexpected
latency. | [] | null | null | null | null |
|
CVE-2017-0921 | GitLab Community and Enterprise Editions before 10.1.6, 10.2.6, and 10.3.4 are vulnerable to an unverified password change issue in the PasswordsController component resulting in potential account takeover if a victim's session is compromised. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | null | 8.1 | 6.8 |
|
GHSA-mh9h-9rjj-5gp4 | Heap-based buffer overflow in QuickTimeAuthoring.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FLC file, related to crafted DELTA_FLI chunks and untrusted length values in a .fli file, which are not properly handled during decompression. | [] | null | null | null | null |
|
CVE-1999-0653 | A component service related to NIS+ is running. | [] | null | null | null | 10 |
|
CVE-2004-0422 | flim before 1.14.3 creates temporary files insecurely, which allows local users to overwrite arbitrary files of the Emacs user via a symlink attack. | [
"cpe:2.3:a:gnu:flim:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-36921 | wifi: iwlwifi: mvm: guard against invalid STA ID on removal | In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: guard against invalid STA ID on removal
Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would
result in out-of-bounds array accesses. This prevents issues should the
driver get into a bad state during error handling. | [] | null | 7.8 | null | null |
GHSA-m45w-qgh5-r75j | Cross Site Scripting vulnerability in ABO.CMS v.5.9.3 allows an attacker to execute arbitrary code via a crafted payload to the Referer header. | [] | null | 6.1 | null | null |
|
GHSA-rm4g-wh53-mp9c | Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges. | [] | null | null | null | null |
|
CVE-2020-29582 | In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions. | [
"cpe:2.3:a:jetbrains:kotlin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-q65c-g7rw-fq59 | A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file /user/s.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-219702 is the identifier assigned to this vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2024-24935 | WordPress Basic Log Viewer Plugin <= 1.0.4 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in WpSimpleTools Basic Log Viewer.This issue affects Basic Log Viewer: from n/a through 1.0.4.
| [
"cpe:2.3:a:wpsimpletools:basic_log_viewer:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-h8w6-c53g-53vv | Missing permission checks in Jenkins Sounds Plugin allow OS command execution | Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins. | [] | null | 8.8 | null | null |
RHSA-2019:4111 | Red Hat Security Advisory: firefox security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
GHSA-p4m6-8jwc-q4v3 | The nsAPI interface in Cisco Cloud Portal 9.1 SP1 and SP2, and 9.3 through 9.3.2, does not properly check privileges, which allows remote authenticated users to obtain sensitive information via a crafted URL, aka Bug ID CSCud81134. | [] | null | null | null | null |
|
GHSA-wcw7-26p5-ffxv | Due to a Protection Mechanism Failure in SAP
NetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass
the configured malware scanner API because of a programming error. This leads
to a low impact on the application's confidentiality, integrity, and
availability. | [] | null | 4.7 | null | null |
|
CVE-2023-3206 | Chengdu VEC40G denial of service | A vulnerability classified as problematic was found in Chengdu VEC40G 3.0. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=restart. The manipulation of the argument restart with the input reboot leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:feiyuxing:vec40g_firmware:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:feiyuxing:vec40g:-:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 5 |
GHSA-62xq-66fv-wc89 | Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow a privileged user to enable escalation of privilege via local access. | [] | 8.4 | 8.2 | null | null |
|
CVE-2015-0320 | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0322. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2007-0349 | Directory traversal vulnerability in upgrade.php in nicecoder.com INDEXU 5.x allows remote attackers to include arbitrary local files via a .. (dot dot) in the gateway parameter. | [
"cpe:2.3:a:nicecoder:indexu:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-5615 | Unspecified vulnerability in Oracle Sun Solaris 11.3 allows local users to affect availability via vectors related to Lynx. | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
CVE-2025-21489 | Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: Region Mapping). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data as well as unauthorized read access to a subset of Oracle Advanced Outbound Telephony accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3-12.2.10:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2025-21667 | iomap: avoid avoid truncating 64-bit offset to 32 bits | In the Linux kernel, the following vulnerability has been resolved:
iomap: avoid avoid truncating 64-bit offset to 32 bits
on 32-bit kernels, iomap_write_delalloc_scan() was inadvertently using a
32-bit position due to folio_next_index() returning an unsigned long.
This could lead to an infinite loop when writing to an xfs filesystem. | [] | null | 5.5 | null | null |
GHSA-4cwh-8w4g-jxxh | Answer contains Improper Access Control vulnerability | Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4. | [] | null | 9.8 | null | null |
GHSA-5vhw-xq26-5fww | WTCMS 1.0 is vulnerable to Incorrect Access Control in \Common\Controller\HomebaseController.class.php. | [] | null | 9.8 | null | null |
|
CVE-2018-16525 | Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to execute arbitrary code or leak information because of a Buffer Overflow during parsing of DNS\LLMNR packets in prvParseDNSReply. | [
"cpe:2.3:a:amazon:amazon_web_services_freertos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amazon:freertos:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
GHSA-wp7f-xph3-r8ph | There is a Cross-site Scripting vulnerability in ArcGIS Server in versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. The privileges required to execute this attack are high. | [] | null | 3.4 | null | null |
|
GHSA-3hf8-m65w-793g | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 9.8 | null |
|
CVE-2014-6199 | The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote attackers to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-c9pj-mwph-2xjm | Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors. | [] | null | null | null | null |
|
CVE-2017-12649 | XSS exists in Liferay Portal before 7.0 CE GA4 via a crafted title or summary that is mishandled in the Web Content Display. | [
"cpe:2.3:a:liferay:liferay_portal:*:ga3:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2018-17792 | MDaemon Webmail (formerly WorldClient) has CSRF. | [
"cpe:2.3:a:altn:mdaemon_webmail:14.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-7745-m57w-m242 | D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address. | [] | null | null | null | null |
|
GHSA-4c47-qmr5-wqcp | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [] | null | null | null | null |
|
RHSA-2022:4856 | Red Hat Security Advisory: postgresql:12 security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
CVE-2015-3256 | PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation." | [
"cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2024-4366 | Spectra – WordPress Gutenberg Blocks <= 2.13.0 - Authenticated (Author+) Stored Cross-Site Scripting | The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘block_id’ parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-w23q-4hw3-2pp6 | Minio vulnerable to Privilege Escalation on Windows via Path separator manipulation | ImpactAll users on Windows are impacted. MinIO fails to filter the `\` character, which allows for arbitrary object placement across
buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to `PutObject` in a specific bucket, can create an admin user.PatchesThere are two patches that fix this problem comprehensivelyWorkaroundsThere are no known workaroundsReferencesThe vulnerable code: | [] | null | 8.8 | null | null |
CVE-2022-25849 | Cross-site Scripting (XSS) | The package joyqi/hyper-down from 0.0.0 are vulnerable to Cross-site Scripting (XSS) because the module of parse markdown does not filter the href attribute very well. | [
"cpe:2.3:a:hyperdown_project:hyperdown:*:*:*:*:*:node.js:*:*"
] | null | 5.4 | null | null |
RHSA-2019:1116 | Red Hat Security Advisory: redhat-virtualization-host security update | edk2: Buffer Overflow in BlockIo service for RAM disk | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.3 | null |
CVE-2008-6427 | SQL injection vulnerability in index.php in Hivemaker Professional 1.0.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [
"cpe:2.3:a:hivemaker:hivemaker:*:-:pro:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-343h-59g9-rg9p | Cross-site scripting (XSS) vulnerability in Big Blue Guestbook allows remote attackers to inject arbitrary web script or HTML via the message field in the guestbook entry submission form. | [] | null | null | null | null |
|
RHSA-2025:0421 | Red Hat Security Advisory: java-17-openjdk security update for RHEL 8.4 | JDK: Enhance array handling (Oracle CPU 2025-01) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 4.8 | null | null |
GHSA-4xqj-427q-hf6q | NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file | [] | null | 7.8 | null | null |
|
CVE-2011-3957 | Use-after-free vulnerability in the garbage-collection functionality in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving PDF documents. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pgrq-7rj5-gx6x | Cisco IOS 12.2 through 12.4 and 15.0 through 15.3, and IOS XE 2.1 through 3.9, allows remote attackers to cause a denial of service (device reload) via crafted DHCP packets that are processed locally by a (1) server or (2) relay agent, aka Bug ID CSCug31561. | [] | null | null | null | null |
|
CVE-2021-33534 | WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. | [
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2021-36402 | In Moodle, Users' names required additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-mhmm-rgjv-95hx | The Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [] | null | 6.4 | null | null |
|
GHSA-q9ww-gjpw-p9g6 | Improper Restriction of Excessive Authentication Attempts in modoboa | Improper Restriction of Excessive Authentication Attempts in GitHub repository modoboa/modoboa-installer prior to 2.0.4. | [] | null | 7.5 | null | null |
GHSA-c9j2-8536-x27c | AIX techlibss allows local users to overwrite files via a symlink attack. | [] | null | null | null | null |
|
CVE-2008-1551 | SQL injection vulnerability in viewcat.php in the Photo 3.02 module for RunCMS allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [
"cpe:2.3:a:runcms:photo_module:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-4492 | Multiple unspecified vulnerabilities in the ata disk driver in Sun Solaris 8, 9, and 10 on the x86 platform before 20070821 allow local users to cause a denial of service (system panic) via unspecified ioctl functions, aka Bug 6433123. | [
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-vcmm-ppqx-95ch | Logstash Logs Sensitive Information | Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information. | [] | null | null | 7.5 | null |
CVE-2003-1467 | Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:unix:unix:any_version:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2014-7652 | The Magicam Photo Magic Editor (aka mobi.magicam.editor) application 5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:magicam_photo_magic_editor_project:magicam_photo_magic_editor:5:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
RHSA-2014:1083 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: do not access controls outside of protected regions Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
CVE-2024-11415 | WP-Orphanage Extended <= 1.2 - Cross-Site Request Forgery to Orphan Account Privilege Escalation | The WP-Orphanage Extended plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wporphanageex_menu_settings() function. This makes it possible for unauthenticated attackers to escalate the privileges of all orphan accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:meloniq.net:wp-orphanage_extended:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-cqcc-f4j6-cmh9 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
GHSA-274c-jx98-whwv | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. | [] | null | null | 7.3 | null |
|
GHSA-g89c-gj6q-v3fw | mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448. | [] | null | null | 7.5 | null |
|
CVE-2021-25049 | Mobile Events Manager < 1.4.4 - Admin+ Stored Cross-Site Scripting | The Mobile Events Manager WordPress plugin before 1.4.4 does not sanitise and escape various of its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [
"cpe:2.3:a:mobileeventsmanager:mobile_events_manager:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2019-20849 | An issue was discovered in Mattermost Mobile Apps before 1.26.0. Cookie data can persist on a device after a logout. | [
"cpe:2.3:a:mattermost:mattermost_mobile:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2010-2926 | SQL injection vulnerability in index.php in sNews 1.7 allows remote attackers to execute arbitrary SQL commands via the category parameter. | [
"cpe:2.3:a:solucija:snews:1.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-v297-fw62-483j | October CMS build 412 is vulnerable to PHP code execution in the asset manager functionality resulting in site compromise and possibly other applications on the server. | [] | null | null | 9.8 | null |
|
GHSA-63rx-qv87-g36c | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039. | [] | null | null | null | null |
|
GHSA-cx75-p9pm-2q97 | Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel "CALL Vulnerability." | [] | null | null | null | null |
|
CVE-2019-7800 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2020-24136 | Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php. | [
"cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*"
] | null | 8.6 | null | 7.8 |
|
CVE-2017-7694 | Remote Code Execution vulnerability in symphony/content/content.blueprintsdatasources.php in Symphony CMS through 2.6.11 allows remote attackers to execute code and get a webshell from the back-end. The attacker must be authenticated and enter PHP code in the datasource editor or event editor. | [
"cpe:2.3:a:getsymphony:symphony:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-856w-rm82-4hp7 | In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via a trust boundary violation vulnerability. | [] | null | 5.3 | null | null |
|
CVE-2022-0625 | Admin Menu Editor <= 1.0.4 - Reflected Cross-Site Scripting | The Admin Menu Editor WordPress plugin through 1.0.4 does not sanitize and escape a parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | [
"cpe:2.3:a:admin_menu_editor_project:admin_menu_editor:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
RHBA-2020:2017 | Red Hat Bug Fix Advisory: Advanced Virtualization bug fix and enhancement update | libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 5.8 | null | null |
CVE-2017-16172 | section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:section2.madisonjbrooks12_project:section2.madisonjbrooks12:0.1.1:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2005-3693 | The AxWebRemoveCtrl ActiveX control for uninstalling the SunnComm MediaMax DRM allows remote attackers to download and execute arbitrary code, a similar vulnerability to CVE-2005-3650. | [
"cpe:2.3:a:sunncomm_mediamax:axwebremovectrl:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2014-1275 | Buffer overflow in ImageIO in Apple iOS before 7.1 and Apple TV before 6.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-32550 | WordPress BMI Adult & Kid Calculator plugin <= 1.2.1 - CSRF to XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in BMI Adult & Kid Calculator allows Stored XSS.This issue affects BMI Adult & Kid Calculator: from n/a through 1.2.1.
| [] | null | 7.1 | null | null |
CVE-2021-21907 | A directory traversal vulnerability exists in the CMA CLI getenv command functionality of Garrett Metal Detectors’ iC Module CMA Version 5.0. A specially-crafted command line argument can lead to local file inclusion. An attacker can provide malicious input to trigger this vulnerability. | [
"cpe:2.3:o:garrett:ic_module_cma:5.0:*:*:*:*:*:*:*"
] | null | null | 4.9 | null |
Subsets and Splits