id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2022:0157 | Red Hat Security Advisory: kernel security update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: race condition for removal of the HCI controller | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7 | null | null |
CVE-2022-36899 | Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties. | [
"cpe:2.3:a:jenkins:compuware_ispw_operations:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-5h3p-5xx6-mh88 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges. | [] | null | 6.7 | null | null |
|
CVE-2010-2151 | Cross-site request forgery (CSRF) vulnerability in Fujitsu e-Pares V01 L01 V01 L01, L03, L10, L20, L30, and L40 allows remote attackers to hijack the authentication of users for requests that modify "facility reservation data" via unknown vectors. | [
"cpe:2.3:a:fujitsu:e-pares:l01:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:l03:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:l10:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:l20:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:l30:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:l40:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:e-pares:v01:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-v9mv-xwff-7whp | Path traversal vulnerability in Galaxy Themes prior to SMR May-2022 Release 1 allows attackers to list file names in arbitrary directory as system user. The patch addresses incorrect implementation of file path validation check logic. | [] | null | 3.3 | null | null |
|
CVE-2022-32840 | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-wm7m-wv4x-65rq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebCodingPlace Ultimate Classified Listings allows Stored XSS.This issue affects Ultimate Classified Listings: from n/a through 1.4. | [] | null | 6.5 | null | null |
|
RHSA-2020:1267 | Red Hat Security Advisory: nss-softokn security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.1 | null |
CVE-2016-8682 | The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.25:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-r84c-983f-q52v | In getEnabledAccessibilityServiceList of AccessibilityManager.java, there is a possible way to hide an accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243849844 | [] | null | 7.8 | null | null |
|
GHSA-47vr-m75r-g978 | Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets." | [] | null | null | null | null |
|
RHSA-2020:5086 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs-dot-prop: prototype pollution nodejs: HTTP request smuggling due to CR-to-Hyphen conversion libuv: buffer overflow in realpath npm: sensitive information exposure through logs | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.4 | null | null |
CVE-2017-15737 | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADIMAGE+0x00000000003d246f." | [
"cpe:2.3:a:irfanview:irfanview:4.50:*:*:*:*:x64:*:*",
"cpe:2.3:a:irfanview:cadimage:12.0.0.5:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-24m4-fmx6-c2q6 | tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition. | [] | null | 8.8 | null | null |
|
CVE-2006-2591 | Unspecified vulnerability in e107 before 0.7.5 has unknown impact and remote attack vectors related to an "emailing exploit". | [
"cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-2275 | The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code. | [
"cpe:2.3:h:advantech:vesp211-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:vesp211-eu_firmware:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:vesp211-232:-:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:vesp211-232_firmware:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:vesp211-232_firmware:1.7.2:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2019-13570 | The AJdG AdRotate plugin before 5.3 for WordPress allows SQL Injection. | [
"cpe:2.3:a:ajdg:adrotate:*:*:*:*:pro:wordpress:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-j98c-6x58-jmvw | The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.7. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save code snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-4323-cfj5-98mh | Dolibarr ERP and CRM contain XSS Vulnerability | Dolibarr ERP/CRM is affected by stored Cross-Site Scripting (XSS) in versions through 7.0.0. | [] | null | null | 5.4 | null |
GHSA-pr7g-498h-frwf | In the Linux kernel, the following vulnerability has been resolved:ALSA: seq: oss: Fix races at processing SysEx messagesOSS sequencer handles the SysEx messages split in 6 bytes packets, and
ALSA sequencer OSS layer tries to combine those. It stores the data
in the internal buffer and this access is racy as of now, which may
lead to the out-of-bounds access.As a temporary band-aid fix, introduce a mutex for serializing the
process of the SysEx message packets. | [] | null | null | null | null |
|
GHSA-mgh9-r97v-cgxx | Buffer overflow in a certain ActiveX control in LTRDF14e.DLL 14.5.0.44 in LeadTools Raster Dialog File Object allows remote attackers to execute arbitrary code via a long Directory property value. | [] | null | null | null | null |
|
GHSA-77mp-cm2p-44gj | When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox < 110. | [] | null | 6.5 | null | null |
|
GHSA-2gx2-9hj7-p6pc | Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-6529 | WP VR < 8.3.15 - Unauthenticated Plugin Downgrade leading to XSS | The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities. | [
"cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2020-9452 | An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API. | [
"cpe:2.3:a:acronis:true_image_2020:24.5.22510:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2018-11591 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. | [
"cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-jj42-27cj-4ph7 | Multiple unspecified vulnerabilities in the Innovasys DockStudioXP InnovaDSXP2.OCX ActiveX Control have unspecified attack vectors and impact, including a denial of service via "improper use" of the SaveToFile function. | [] | null | null | null | null |
|
CVE-2022-41859 | In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack. | [
"cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-mrqf-77v8-cwvf | In ipSecSetEncapSocketOwner of XfrmController.cpp, there is a possible failure to initialize a security feature due to uninitialized data. This could lead to local denial of service of IPsec on sockets with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9.0 Android ID: A-111650288 | [] | null | null | 5.5 | null |
|
GHSA-h5fw-xv87-xfpg | Karotz API 12.07.19.00: Session Token Information Disclosure | [] | null | 5.3 | null | null |
|
RHSA-2024:3368 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.3 security update | argocd: Use of Risky or Missing Cryptographic Algorithms in Redis Cache | [
"cpe:/a:redhat:openshift_gitops:1.12::el8"
] | null | 9.6 | null | null |
GHSA-w79p-mgwq-qwg7 | An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. | [] | null | null | 6.5 | null |
|
GHSA-7h5p-3h8w-5629 | In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix potential deadlock with newly created symlinksSyzbot reported that page_symlink(), called by nilfs_symlink(), triggers
memory reclamation involving the filesystem layer, which can result in
circular lock dependencies among the reader/writer semaphore
nilfs->ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the
fs_reclaim pseudo lock.This is because after commit 21fc61c73c39 ("don't put symlink bodies in
pagecache into highmem"), the gfp flags of the page cache for symbolic
links are overwritten to GFP_KERNEL via inode_nohighmem().This is not a problem for symlinks read from the backing device, because
the __GFP_FS flag is dropped after inode_nohighmem() is called. However,
when a new symlink is created with nilfs_symlink(), the gfp flags remain
overwritten to GFP_KERNEL. Then, memory allocation called from
page_symlink() etc. triggers memory reclamation including the FS layer,
which may call nilfs_evict_inode() or nilfs_dirty_inode(). And these can
cause a deadlock if they are called while nilfs->ns_segctor_sem is held:Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags
of newly created symlinks in the same way that nilfs_new_inode() and
__nilfs_read_inode() do, as a workaround until we adopt nofs allocation
scope consistently or improve the locking constraints. | [] | null | 5.5 | null | null |
|
GHSA-f5fg-vq9p-rjrw | A vulnerability has been identified in Solid Edge SE2022 (All versions < V2210Update12), Solid Edge SE2023 (All versions < V2023Update2). The affected application is vulnerable to heap-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2024-27110 | Elevation of privilege vulnerability in GE HealthCare EchoPAC products | Elevation of privilege vulnerability in GE HealthCare EchoPAC products | [
"cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
GHSA-x9qq-h45j-7chv | A DLL preloading vulnerability was reported in Lenovo Driver Management prior to version 2.9.0719.1104 that could allow privilege escalation. | [] | null | 7.8 | null | null |
|
GHSA-85j8-f9p2-2wvq | An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | [] | null | 5.4 | null | null |
|
CVE-2025-0809 | Link Fixer <= 3.4 - Unauthenticated Stored Cross-Site Scripting | The Link Fixer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via broken links in all versions up to, and including, 3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
CVE-2024-25979 | Msa-24-0002: forum search accepted random parameters in its url | The URL parameters accepted by forum search were not limited to the allowed parameters. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2022-4929 | icplayer tts-utils.js cross site scripting | A vulnerability was found in icplayer up to 0.818. It has been rated as problematic. Affected by this issue is some unknown functionality of the file addons/Commons/src/tts-utils.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.819 is able to address this issue. The patch is identified as fa785969f213c76384f1fe67d47b17d57fcc60c8. It is recommended to upgrade the affected component. VDB-222290 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:learnetic:icplayer:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-wmpx-6wwp-cvc6 | In the Linux kernel, the following vulnerability has been resolved:ALSA: 6fire: Release resources at card releaseThe current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort(). But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback. | [] | null | 7.8 | null | null |
|
CVE-2018-8219 | An elevation of privilege vulnerability exists when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 |
|
GHSA-v98x-wm9v-cm22 | Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value. | [] | null | null | null | null |
|
CVE-2020-7829 | DaviewIndy Heap-based Buffer Overflow Vulnerability | DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution. | [
"cpe:2.3:a:hmtalk:daviewindy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-4386-29wm-8h9p | SearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in "Featured Results" parameter. | [] | null | 9.8 | null | null |
|
GHSA-wmff-grcw-jcfm | Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles | ImpactThe 1.4.0 release includes a regression on the filesystem scope check for dotfiles on Linux and macOS.Previously dotfiles (eg. `$HOME/.ssh/`) were not implicitly allowed by the glob wildcard scopes (eg. `$HOME/*`), but a regression was introduced when a configuration option for this behavior was implemented and dotfiles were implicitly allowed.Only Tauri applications using wildcard scopes in the `fs` endpoint are affected.
Only macOS and Linux systems are affected.PatchesThe regression has been patched on `v1.4.1`.WorkaroundsThere are no known workarounds at this time, users should update to `v1.4.1` immediately.ReferencesSee the [original advisory](https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5) for more information.For more InformationIf you have any questions or comments about this advisory:Open an issue in tauri
Email us at [[email protected]](mailto:[email protected]) | [] | null | 4.8 | null | null |
GHSA-6m83-5wvp-9cj3 | A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1. | [] | null | 7.5 | null | null |
|
CVE-2024-30085 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-3608 | Product Designer <= 1.0.33 - Missing Authorization to Unauthenticated Arbitrary Attachment Deletion | The Product Designer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the product_designer_ajax_delete_attach_id() function in all versions up to, and including, 1.0.33. This makes it possible for unauthenticated attackers to delete arbitrary attachments. | [
"cpe:2.3:a:pickplugins:product_designer:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
RHSA-2023:6914 | Red Hat Security Advisory: python3.11-pip security update | python: tarfile module directory traversal | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
CVE-2018-13522 | The mintToken function of a smart contract implementation for EXGROUP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:exgroup_project:exgroup:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2011-3722 | Coppermine Photo Gallery (CPG) 1.5.12 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by include/inspekt.php and certain other files. | [
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.12:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-hwv8-q8m9-3f2j | Pega Platform versions 6.x to Infinity 24.1.1 are affected by an issue with Improper Control of Generation of Code | [] | null | 9.1 | null | null |
|
GHSA-qgch-26fj-87r3 | In the Linux kernel, the following vulnerability has been resolved:udf: refactor inode_bmap() to handle errorRefactor inode_bmap() to handle error since udf_next_aext() can return
error now. On situations like ftruncate, udf_extend_file() can now
detect errors and bail out early without resorting to checking for
particular offsets and assuming internal behavior of these functions. | [] | null | 3.3 | null | null |
|
CVE-2023-24436 | A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:github_pull_request_builder:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | null |
|
CVE-2018-18497 | Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-50616 | Ironman PowerShell Universal 5.x before 5.0.12 allows an authenticated attacker to elevate their privileges and view job information. | [
"cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-926f-mjrv-g5m6 | A DNS server allows zone transfers. | [] | null | null | null | null |
|
CVE-2009-4917 | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via a high volume of SIP traffic, aka Bug ID CSCsr65901. | [
"cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-9q87-5v6f-82ph | IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. | [] | null | 4.3 | null | null |
|
CVE-2023-24202 | Raffle Draw System v1.0 was discovered to contain a local file inclusion vulnerability via the page parameter in index.php. | [
"cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2002-0112 | Etype Eserv 2.97 allows remote attackers to view password protected files via /./ in the URL. | [
"cpe:2.3:a:etype:eserv:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.93:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.94:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.95_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.96:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.97:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-2gjp-pxq3-jj7r | Etype Eserv 2.97 allows remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command. | [] | null | null | null | null |
|
CVE-2012-0861 | The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack. | [
"cpe:2.3:a:redhat:enterprise_virtualization_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_virtualization_manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-29218 | A local unquoted search path security vulnerability has been identified in HPE Agentless Management Service for Windows version(s): Prior to 1.44.0.0, 10.96.0.0. This vulnerability could be exploited locally by a user with high privileges to execute malware that may lead to a loss of confidentiality, integrity, and availability. HPE has provided software updates to resolve the vulnerability in HPE Agentless Management Service for Windows. | [
"cpe:2.3:a:hpe:agentless_management:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*",
"cpe:2.3:a:hpe:proliant_agentless_management:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_2000_gen_10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_480_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_620_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_660_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_680_gen9:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-9hh8-pv8q-9qj8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5. | [] | null | 7.1 | null | null |
|
GHSA-g279-3gh8-w39f | An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system. | [] | null | 7.5 | null | null |
|
GHSA-m96m-v25p-c746 | An issue was discovered in Veritas NetBackup Before 7.7 and NetBackup Appliance Before 2.7. There are world-writable log files, allowing destruction or spoofing of log data. | [] | null | null | 5.5 | null |
|
CVE-2014-2907 | The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-fqg8-v2mm-x3f8 | The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask. | [] | null | null | null | null |
|
CVE-2017-7610 | The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file. | [
"cpe:2.3:a:elfutils_project:elfutils:0.168:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2022-27005 | Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the setWanCfg function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | [
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 7.5 |
|
CVE-2008-3317 | admin/index.php in Maian Search 1.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary search_cookie cookie. | [
"cpe:2.3:a:maian_script_world:maian_search:*:*:*:*:*:*:*:*",
"cpe:2.3:a:maian_script_world:maian_search:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-3682 | SDM600 file permission validation | A vulnerability exists in the SDM600 file permission validation.
An attacker could exploit the vulnerability by gaining access to the system and uploading a specially crafted message to the system node, which could result in Arbitrary code Executing.
This issue affects: All SDM600 versions prior to version 1.2 FP3 HF4 (Build Nr. 1.2.23000.291)
List of CPEs:
* cpe:2.3:a:hitachienergy:sdm600:1.0:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.1:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.9002.257:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.10002.257:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.11002.149:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.12002.222:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.13002.72:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.44:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.92:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.108:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.182:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.257:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.342:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.447:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.481:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.506:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.14002.566:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.20000.3174:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.21000.291:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.21000.931:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.21000.105:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:sdm600:1.2.23000.291:*:*:*:*:*:*:*
| [
"cpe:2.3:a:hitachienergy:sdm600:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null |
RHSA-2014:1312 | Red Hat Security Advisory: bash Shift_JIS security update | bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/a:redhat:rhel_sjis:5",
"cpe:/a:redhat:rhel_sjis:6"
] | null | null | null | null |
GHSA-4w67-px32-572v | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'deleted' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database. | [] | null | 9.8 | null | null |
|
RHSA-2017:1244 | Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update | ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment | [
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7",
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7"
] | null | null | 5.3 | null |
GHSA-r96j-7gxg-wp39 | Local user gains root privileges via buffer overflow in rdist, via expstr() function. | [] | null | 7.8 | null | null |
|
CVE-2023-26495 | An issue was discovered in Open Design Alliance Drawings SDK before 2024.1. A crafted DWG file can force the SDK to reuse an object that has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code. | [
"cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-21930 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 4.2 | null | null |
GHSA-chgg-w4jf-5wx7 | Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security. | [] | null | null | null | null |
|
CVE-2021-3377 | The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. | [
"cpe:2.3:a:ansi_up_project:ansi_up:*:*:*:*:*:node.js:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-qqxh-rx37-mcf4 | Windows Console Driver Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
Subsets and Splits