id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2022:0157
Red Hat Security Advisory: kernel security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: race condition for removal of the HCI controller
[ "cpe:/o:redhat:rhel_els:6" ]
null
7
null
null
CVE-2022-36899
Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
[ "cpe:2.3:a:jenkins:compuware_ispw_operations:*:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*" ]
null
8.2
null
null
GHSA-5h3p-5xx6-mh88
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.
[]
null
6.7
null
null
CVE-2010-2151
Cross-site request forgery (CSRF) vulnerability in Fujitsu e-Pares V01 L01 V01 L01, L03, L10, L20, L30, and L40 allows remote attackers to hijack the authentication of users for requests that modify "facility reservation data" via unknown vectors.
[ "cpe:2.3:a:fujitsu:e-pares:l01:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:l03:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:l10:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:l20:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:l30:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:l40:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu:e-pares:v01:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-v9mv-xwff-7whp
Path traversal vulnerability in Galaxy Themes prior to SMR May-2022 Release 1 allows attackers to list file names in arbitrary directory as system user. The patch addresses incorrect implementation of file path validation check logic.
[]
null
3.3
null
null
CVE-2022-32840
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-wm7m-wv4x-65rq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebCodingPlace Ultimate Classified Listings allows Stored XSS.This issue affects Ultimate Classified Listings: from n/a through 1.4.
[]
null
6.5
null
null
RHSA-2020:1267
Red Hat Security Advisory: nss-softokn security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.1
null
CVE-2016-8682
The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
[ "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.25:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-r84c-983f-q52v
In getEnabledAccessibilityServiceList of AccessibilityManager.java, there is a possible way to hide an accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243849844
[]
null
7.8
null
null
GHSA-47vr-m75r-g978
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets."
[]
null
null
null
null
RHSA-2020:5086
Red Hat Security Advisory: rh-nodejs12-nodejs security update
nodejs-dot-prop: prototype pollution nodejs: HTTP request smuggling due to CR-to-Hyphen conversion libuv: buffer overflow in realpath npm: sensitive information exposure through logs
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.4
null
null
CVE-2017-15737
IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADIMAGE+0x00000000003d246f."
[ "cpe:2.3:a:irfanview:irfanview:4.50:*:*:*:*:x64:*:*", "cpe:2.3:a:irfanview:cadimage:12.0.0.5:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-24m4-fmx6-c2q6
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
[]
null
8.8
null
null
CVE-2006-2591
Unspecified vulnerability in e107 before 0.7.5 has unknown impact and remote attack vectors related to an "emailing exploit".
[ "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2016-2275
The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code.
[ "cpe:2.3:h:advantech:vesp211-eu:-:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:vesp211-eu_firmware:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:h:advantech:vesp211-232:-:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:vesp211-232_firmware:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:vesp211-232_firmware:1.7.2:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2019-13570
The AJdG AdRotate plugin before 5.3 for WordPress allows SQL Injection.
[ "cpe:2.3:a:ajdg:adrotate:*:*:*:*:pro:wordpress:*:*" ]
null
null
7.2
6.5
GHSA-j98c-6x58-jmvw
The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.7. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save code snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-4323-cfj5-98mh
Dolibarr ERP and CRM contain XSS Vulnerability
Dolibarr ERP/CRM is affected by stored Cross-Site Scripting (XSS) in versions through 7.0.0.
[]
null
null
5.4
null
GHSA-pr7g-498h-frwf
In the Linux kernel, the following vulnerability has been resolved:ALSA: seq: oss: Fix races at processing SysEx messagesOSS sequencer handles the SysEx messages split in 6 bytes packets, and ALSA sequencer OSS layer tries to combine those. It stores the data in the internal buffer and this access is racy as of now, which may lead to the out-of-bounds access.As a temporary band-aid fix, introduce a mutex for serializing the process of the SysEx message packets.
[]
null
null
null
null
GHSA-mgh9-r97v-cgxx
Buffer overflow in a certain ActiveX control in LTRDF14e.DLL 14.5.0.44 in LeadTools Raster Dialog File Object allows remote attackers to execute arbitrary code via a long Directory property value.
[]
null
null
null
null
GHSA-77mp-cm2p-44gj
When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox < 110.
[]
null
6.5
null
null
GHSA-2gx2-9hj7-p6pc
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2023-6529
WP VR < 8.3.15 - Unauthenticated Plugin Downgrade leading to XSS
The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities.
[ "cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
CVE-2020-9452
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.
[ "cpe:2.3:a:acronis:true_image_2020:24.5.22510:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2018-11591
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c.
[ "cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-jj42-27cj-4ph7
Multiple unspecified vulnerabilities in the Innovasys DockStudioXP InnovaDSXP2.OCX ActiveX Control have unspecified attack vectors and impact, including a denial of service via "improper use" of the SaveToFile function.
[]
null
null
null
null
CVE-2022-41859
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
[ "cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-mrqf-77v8-cwvf
In ipSecSetEncapSocketOwner of XfrmController.cpp, there is a possible failure to initialize a security feature due to uninitialized data. This could lead to local denial of service of IPsec on sockets with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9.0 Android ID: A-111650288
[]
null
null
5.5
null
GHSA-h5fw-xv87-xfpg
Karotz API 12.07.19.00: Session Token Information Disclosure
[]
null
5.3
null
null
RHSA-2024:3368
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.3 security update
argocd: Use of Risky or Missing Cryptographic Algorithms in Redis Cache
[ "cpe:/a:redhat:openshift_gitops:1.12::el8" ]
null
9.6
null
null
GHSA-w79p-mgwq-qwg7
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.
[]
null
null
6.5
null
GHSA-7h5p-3h8w-5629
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix potential deadlock with newly created symlinksSyzbot reported that page_symlink(), called by nilfs_symlink(), triggers memory reclamation involving the filesystem layer, which can result in circular lock dependencies among the reader/writer semaphore nilfs->ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the fs_reclaim pseudo lock.This is because after commit 21fc61c73c39 ("don't put symlink bodies in pagecache into highmem"), the gfp flags of the page cache for symbolic links are overwritten to GFP_KERNEL via inode_nohighmem().This is not a problem for symlinks read from the backing device, because the __GFP_FS flag is dropped after inode_nohighmem() is called. However, when a new symlink is created with nilfs_symlink(), the gfp flags remain overwritten to GFP_KERNEL. Then, memory allocation called from page_symlink() etc. triggers memory reclamation including the FS layer, which may call nilfs_evict_inode() or nilfs_dirty_inode(). And these can cause a deadlock if they are called while nilfs->ns_segctor_sem is held:Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags of newly created symlinks in the same way that nilfs_new_inode() and __nilfs_read_inode() do, as a workaround until we adopt nofs allocation scope consistently or improve the locking constraints.
[]
null
5.5
null
null
GHSA-f5fg-vq9p-rjrw
A vulnerability has been identified in Solid Edge SE2022 (All versions < V2210Update12), Solid Edge SE2023 (All versions < V2023Update2). The affected application is vulnerable to heap-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
[]
null
7.8
null
null
CVE-2024-27110
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
[ "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*", "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-x9qq-h45j-7chv
A DLL preloading vulnerability was reported in Lenovo Driver Management prior to version 2.9.0719.1104 that could allow privilege escalation.
[]
null
7.8
null
null
GHSA-85j8-f9p2-2wvq
An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
null
5.4
null
null
CVE-2025-0809
Link Fixer <= 3.4 - Unauthenticated Stored Cross-Site Scripting
The Link Fixer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via broken links in all versions up to, and including, 3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
CVE-2024-25979
Msa-24-0002: forum search accepted random parameters in its url
The URL parameters accepted by forum search were not limited to the allowed parameters.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2022-4929
icplayer tts-utils.js cross site scripting
A vulnerability was found in icplayer up to 0.818. It has been rated as problematic. Affected by this issue is some unknown functionality of the file addons/Commons/src/tts-utils.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.819 is able to address this issue. The patch is identified as fa785969f213c76384f1fe67d47b17d57fcc60c8. It is recommended to upgrade the affected component. VDB-222290 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:learnetic:icplayer:*:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
GHSA-wmpx-6wwp-cvc6
In the Linux kernel, the following vulnerability has been resolved:ALSA: 6fire: Release resources at card releaseThe current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as we're calling snd_card_free_when_closed()).For avoid potential UAFs, move the release of resources to the card's private_free instead of the manual call of usb6fire_chip_destroy() at the USB disconnect callback.
[]
null
7.8
null
null
CVE-2018-8219
An elevation of privilege vulnerability exists when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" ]
null
null
8.8
4.6
GHSA-v98x-wm9v-cm22
Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value.
[]
null
null
null
null
CVE-2020-7829
DaviewIndy Heap-based Buffer Overflow Vulnerability
DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
[ "cpe:2.3:a:hmtalk:daviewindy:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-4386-29wm-8h9p
SearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in "Featured Results" parameter.
[]
null
9.8
null
null
GHSA-wmff-grcw-jcfm
Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles
ImpactThe 1.4.0 release includes a regression on the filesystem scope check for dotfiles on Linux and macOS.Previously dotfiles (eg. `$HOME/.ssh/`) were not implicitly allowed by the glob wildcard scopes (eg. `$HOME/*`), but a regression was introduced when a configuration option for this behavior was implemented and dotfiles were implicitly allowed.Only Tauri applications using wildcard scopes in the `fs` endpoint are affected. Only macOS and Linux systems are affected.PatchesThe regression has been patched on `v1.4.1`.WorkaroundsThere are no known workarounds at this time, users should update to `v1.4.1` immediately.ReferencesSee the [original advisory](https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5) for more information.For more InformationIf you have any questions or comments about this advisory:Open an issue in tauri Email us at [[email protected]](mailto:[email protected])
[]
null
4.8
null
null
GHSA-6m83-5wvp-9cj3
A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.
[]
null
7.5
null
null
CVE-2024-30085
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-3608
Product Designer <= 1.0.33 - Missing Authorization to Unauthenticated Arbitrary Attachment Deletion
The Product Designer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the product_designer_ajax_delete_attach_id() function in all versions up to, and including, 1.0.33. This makes it possible for unauthenticated attackers to delete arbitrary attachments.
[ "cpe:2.3:a:pickplugins:product_designer:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
RHSA-2023:6914
Red Hat Security Advisory: python3.11-pip security update
python: tarfile module directory traversal
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
CVE-2018-13522
The mintToken function of a smart contract implementation for EXGROUP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:exgroup_project:exgroup:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2011-3722
Coppermine Photo Gallery (CPG) 1.5.12 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by include/inspekt.php and certain other files.
[ "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.12:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-hwv8-q8m9-3f2j
Pega Platform versions 6.x to Infinity 24.1.1 are affected by an issue with Improper Control of Generation of Code
[]
null
9.1
null
null
GHSA-qgch-26fj-87r3
In the Linux kernel, the following vulnerability has been resolved:udf: refactor inode_bmap() to handle errorRefactor inode_bmap() to handle error since udf_next_aext() can return error now. On situations like ftruncate, udf_extend_file() can now detect errors and bail out early without resorting to checking for particular offsets and assuming internal behavior of these functions.
[]
null
3.3
null
null
CVE-2023-24436
A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:github_pull_request_builder:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
null
CVE-2018-18497
Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2024-50616
Ironman PowerShell Universal 5.x before 5.0.12 allows an authenticated attacker to elevate their privileges and view job information.
[ "cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-926f-mjrv-g5m6
A DNS server allows zone transfers.
[]
null
null
null
null
CVE-2009-4917
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via a high volume of SIP traffic, aka Bug ID CSCsr65901.
[ "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-9q87-5v6f-82ph
IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser.
[]
null
4.3
null
null
CVE-2023-24202
Raffle Draw System v1.0 was discovered to contain a local file inclusion vulnerability via the page parameter in index.php.
[ "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2002-0112
Etype Eserv 2.97 allows remote attackers to view password protected files via /./ in the URL.
[ "cpe:2.3:a:etype:eserv:2.92:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.93:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.94:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.95:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.95_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.96:*:*:*:*:*:*:*", "cpe:2.3:a:etype:eserv:2.97:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-2gjp-pxq3-jj7r
Etype Eserv 2.97 allows remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command.
[]
null
null
null
null
CVE-2012-0861
The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack.
[ "cpe:2.3:a:redhat:enterprise_virtualization_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2021-29218
A local unquoted search path security vulnerability has been identified in HPE Agentless Management Service for Windows version(s): Prior to 1.44.0.0, 10.96.0.0. This vulnerability could be exploited locally by a user with high privileges to execute malware that may lead to a loss of confidentiality, integrity, and availability. HPE has provided software updates to resolve the vulnerability in HPE Agentless Management Service for Windows.
[ "cpe:2.3:a:hpe:agentless_management:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*", "cpe:2.3:a:hpe:proliant_agentless_management:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_20:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_2000_gen_10_plus:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_6500:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_80:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_480_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_620_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_660_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_680_gen9:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-9hh8-pv8q-9qj8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5.
[]
null
7.1
null
null
GHSA-g279-3gh8-w39f
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
[]
null
7.5
null
null
GHSA-m96m-v25p-c746
An issue was discovered in Veritas NetBackup Before 7.7 and NetBackup Appliance Before 2.7. There are world-writable log files, allowing destruction or spoofing of log data.
[]
null
null
5.5
null
CVE-2014-2907
The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-fqg8-v2mm-x3f8
The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask.
[]
null
null
null
null
CVE-2017-7610
The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
[ "cpe:2.3:a:elfutils_project:elfutils:0.168:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
null
null
5.5
4.3
CVE-2022-27005
Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the setWanCfg function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[ "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*" ]
null
8.8
null
7.5
CVE-2008-3317
admin/index.php in Maian Search 1.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary search_cookie cookie.
[ "cpe:2.3:a:maian_script_world:maian_search:*:*:*:*:*:*:*:*", "cpe:2.3:a:maian_script_world:maian_search:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-3682
SDM600 file permission validation
A vulnerability exists in the SDM600 file permission validation. An attacker could exploit the vulnerability by gaining access to the system and uploading a specially crafted message to the system node, which could result in Arbitrary code Executing. This issue affects: All SDM600 versions prior to version 1.2 FP3 HF4 (Build Nr. 1.2.23000.291) List of CPEs: * cpe:2.3:a:hitachienergy:sdm600:1.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.9002.257:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.10002.257:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.11002.149:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.12002.222:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.13002.72:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.44:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.92:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.108:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.182:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.257:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.342:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.447:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.481:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.506:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.14002.566:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.20000.3174:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.21000.291:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.21000.931:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.21000.105:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:sdm600:1.2.23000.291:*:*:*:*:*:*:*
[ "cpe:2.3:a:hitachienergy:sdm600:*:*:*:*:*:*:*:*" ]
null
9.9
null
null
RHSA-2014:1312
Red Hat Security Advisory: bash Shift_JIS security update
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/a:redhat:rhel_sjis:5", "cpe:/a:redhat:rhel_sjis:6" ]
null
null
null
null
GHSA-4w67-px32-572v
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'deleted' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
RHSA-2017:1244
Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update
ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment
[ "cpe:/a:redhat:openshift:3.2::el7", "cpe:/a:redhat:openshift:3.3::el7", "cpe:/a:redhat:openshift:3.4::el7", "cpe:/a:redhat:openshift:3.5::el7" ]
null
null
5.3
null
GHSA-r96j-7gxg-wp39
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
[]
null
7.8
null
null
CVE-2023-26495
An issue was discovered in Open Design Alliance Drawings SDK before 2024.1. A crafted DWG file can force the SDK to reuse an object that has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code.
[ "cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-21930
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
4.2
null
null
GHSA-chgg-w4jf-5wx7
Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
[]
null
null
null
null
CVE-2021-3377
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
[ "cpe:2.3:a:ansi_up_project:ansi_up:*:*:*:*:*:node.js:*:*" ]
null
6.1
null
4.3
GHSA-qqxh-rx37-mcf4
Windows Console Driver Elevation of Privilege Vulnerability
[]
null
7.8
null
null