id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-27g6-7ffq-cf4w | Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. | [] | null | null | null | null |
|
GHSA-3hmm-5fqm-mg46 | emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\template.php. | [] | null | 6.5 | null | null |
|
CVE-2017-0816 | An information disclosure vulnerability in the Android media framework (libeffects). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63662938. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2022-1478 | Use after free in SwiftShader in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-f2h5-f4qx-3rhr | A number of files on the NETSAS Enigma NMS server 65.0.0 and prior are granted weak world-readable and world-writable permissions, allowing any low privileged user with access to the system to read sensitive data (e.g., .htpasswd) and create/modify/delete content (e.g., under /var/www/html/docs) within the operating system. | [] | null | null | null | null |
|
CVE-2019-2999 | Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 4.7 | null | 4 |
|
CVE-2024-37355 | Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 8.5 | 8.8 | null | null |
|
RHSA-2023:2256 | Red Hat Security Advisory: webkit2gtk3 security and bug fix update | webkitgtk: buffer overflow issue was addressed with improved memory handling webkitgtk: out-of-bounds write issue was addressed with improved bounds checking webkitgtk: correctness issue in the JIT was addressed with improved checks webkitgtk: issue was addressed with improved UI handling webkitgtk: type confusion issue leading to arbitrary code execution webkitgtk: sensitive information disclosure issue webkitgtk: use-after-free issue leading to arbitrary code execution webkitgtk: memory disclosure issue was addressed with improved memory handling webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: use-after-free issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: Same Origin Policy bypass issue webkitgtk: logic issue leading to user information disclosure webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: improper bounds checking leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2002-1940 | LCC-Win32 3.2 compiler, when running on Windows 95, 98, or ME, writes portions of previously used memory after the import table, which could allow attackers to gain sensitive information. NOTE: it has been reported that this problem is due to the OS and not the application. | [
"cpe:2.3:a:jacob_navia:lcc-win32:3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-43275 | Cross-Site Request Forgery (CSRF) vulnerability in DedeCMS v5.7 in 110 backend management interface via /catalog_add.php, allows attackers to create crafted web pages due to a lack of verification of the token value of the submitted form. | [
"cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-mrmm-m7c9-vvmg | admin/index.php in Maian Uploader 4.0 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary uploader_cookie cookie. | [] | null | null | null | null |
|
CVE-2018-4269 | A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, macOS High Sierra 10.13.6, tvOS 11.4.1, watchOS 4.3.2, iTunes 12.8 for Windows, iCloud for Windows 7.6. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | 6.8 |
|
GHSA-hr7f-gcqx-fq4v | Windows Hyper-V Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22008, CVE-2022-22009, CVE-2022-24537. | [] | null | 8.8 | null | null |
|
CVE-2012-0787 | The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option. | [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:augeas:augeas:0.9.0:*:*:*:*:*:*:*"
] | null | null | null | 3.7 |
|
CVE-2024-1576 | SQL Injection in MegaBIP | SQL Injection vulnerability in MegaBIP software allows attacker to obtain site administrator privileges, including access to the administration panel and the ability to change the administrator password. This issue affects MegaBIP software versions through 5.09. | [
"cpe:2.3:a:jan_syski:megabip:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:megabip:megabip:*:*:*:*:*:*:*:*"
] | 9.3 | null | null | null |
CVE-2024-44255 | A path handling issue was addressed with improved logic. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, tvOS 18.1. A malicious app may be able to run arbitrary shortcuts without user consent. | [
"cpe:2.3:o:apple:mac_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watch_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
CVE-2008-1972 | Multiple cross-site scripting (XSS) vulnerabilities in the user account creation feature in Exponent CMS 0.96.6-GA20071003 and earlier, when the Allow Registration? configuration option is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) firstname, (3) lastname, and (4) e-mail address fields. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:oicgroup:exponent_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oicgroup:exponent_cms:0.96.6:alpha:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2017:1439 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 flash-plugin: multiple code execution issues fixed in APSB17-17 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
CVE-2022-41938 | Cross site scripting vulnerability with discussion titles in flarum | Flarum is an open source discussion platform. Flarum's page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after `v1.5` and was not noticed. This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS attack occurs after a visitor opens the relevant discussion page. All communities running Flarum from `v1.5.0` to `v1.6.1` are impacted. The vulnerability has been fixed and published as flarum/core `v1.6.2`. All communities running Flarum from `v1.5.0` to `v1.6.1` have to upgrade as soon as possible to v1.6.2. There are no known workarounds for this issue. | [
"cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*"
] | null | 9 | null | null |
GHSA-x8c4-c7gc-p944 | Unspecified vulnerability in the Content Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, and 11.1.0.7; and Oracle Enterprise Manager Grid Control 10.1.0.6, 10.2.0.5, and 11.1.0.1; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scheduler. | [] | null | null | null | null |
|
GHSA-7v9h-wgq9-9cf6 | In forceReplaceShortcutInner of ShortcutPackage.java, there is a possible way to register unlimited packages due to a missing bounds check. This could lead to local denial of service which results in a boot loop with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
GHSA-49m4-j2fj-6qvh | In the Linux kernel, the following vulnerability has been resolved:sched_ext: Fix incorrect autogroup migration detectionscx_move_task() is called from sched_move_task() and tells the BPF scheduler
that cgroup migration is being committed. sched_move_task() is used by both
cgroup and autogroup migrations and scx_move_task() tried to filter out
autogroup migrations by testing the destination cgroup and PF_EXITING but
this is not enough. In fact, without explicitly tagging the thread which is
doing the cgroup migration, there is no good way to tell apart
scx_move_task() invocations for racing migration to the root cgroup and an
autogroup migration.This led to scx_move_task() incorrectly ignoring a migration from non-root
cgroup to an autogroup of the root cgroup triggering the following warning:WARNING: CPU: 7 PID: 1 at kernel/sched/ext.c:3725 scx_cgroup_can_attach+0x196/0x340
...
Call Trace:
<TASK>
cgroup_migrate_execute+0x5b1/0x700
cgroup_attach_task+0x296/0x400
__cgroup_procs_write+0x128/0x140
cgroup_procs_write+0x17/0x30
kernfs_fop_write_iter+0x141/0x1f0
vfs_write+0x31d/0x4a0
__x64_sys_write+0x72/0xf0
do_syscall_64+0x82/0x160
entry_SYSCALL_64_after_hwframe+0x76/0x7eFix it by adding an argument to sched_move_task() that indicates whether the
moving is for a cgroup or autogroup migration. After the change,
scx_move_task() is called only for cgroup migrations and renamed to
scx_cgroup_move_task(). | [] | null | null | null | null |
|
CVE-2023-5878 | OneWireless command injection possible when updating firmware | Honeywell OneWireless
Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to
R322.3, R330.2 or the most recent version of this product2. | [] | 9.4 | null | null | null |
CVE-2018-18058 | An issue was discovered in Bitdefender Engines before 7.76662. A vulnerability has been discovered in the iso.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a division-by-zero circumstance. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. | [
"cpe:2.3:a:bitdefender:scan_engines:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.6 |
|
CVE-2024-12560 | Button Block – Get fully customizable & multi-functional buttons <= 1.1.5 - Authenticated (Contributor+) Post Disclosure via Post Duplication | The Button Block – Get fully customizable & multi-functional buttons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.5 via the 'btn_block_duplicate_post' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract potentially sensitive data from draft, scheduled (future), private, and password protected posts. | [] | null | 4.3 | null | null |
GHSA-5gcf-cj7j-f69f | File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component. | [] | null | 8.8 | null | null |
|
CVE-2020-2100 | Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 5.8 | null | 5 |
|
GHSA-56f6-p52g-2qj4 | Cross-site scripting (XSS) vulnerability in auction.pl in EveryAuction 1.53 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter. NOTE: the provenance of this issue is unknown; the details were obtained solely from third party sources and independently verified using source code inspection. | [] | null | null | null | null |
|
GHSA-x7r4-26m9-hmgq | Moodle vulnerable to symlink attack | `spell-check-logic.cgi` in Moodle 1.9 before 1.9.4, 1.8 before 1.8.8, 1.7 before 1.7.7 and 1.6 before 1.6.9 allows local users to overwrite arbitrary files via a symlink attack on the (1) `/tmp/spell-check-debug.log`, (2) `/tmp/spell-check-before`, or (3) `/tmp/spell-check-after` temporary file. | [] | null | null | null | null |
CVE-2021-20347 | IBM Jazz Foundation and IBM Engineering products are vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 194596. | [
"cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:7.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2008-3268 | Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-hh3c-xpmg-w5fr | Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. | [] | null | 7.5 | null | null |
|
ICSMA-22-244-01 | Contec Health CMS8000 | A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.CVE-2022-36385 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network.CVE-2022-38100 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parameters.CVE-2022-38069 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.CVE-2022-38453 has been assigned to this vulnerability. A CVSS v3 base score of 3.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N). The CMS8000 device does not properly control or sanitize the SSID name of a new Wi-Fi access point. A threat actor could create an SSID with a malicious name, including non-standard characters that, when the device attempts connecting to the malicious SSID, the device can be exploited to write arbitrary files or display incorrect information.CVE-2022-3027 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H). | [] | null | null | 5.7 | null |
GHSA-7vr3-p53x-43w6 | The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image. | [] | null | null | 7.8 | null |
|
GHSA-5q9m-f3cj-62wm | In the Linux kernel, the following vulnerability has been resolved:drm/v3d: Fix potential memory leak in the timestamp extensionIf fetching of userspace memory fails during the main loop, all drm sync
objs looked up until that point will be leaked because of the missing
drm_syncobj_put.Fix it by exporting and using a common cleanup helper.(cherry picked from commit 753ce4fea62182c77e1691ab4f9022008f25b62e) | [] | null | 5.5 | null | null |
|
CVE-2016-6565 | The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 may execute code from an uploaded malicious file | The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration). | [
"cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*"
] | null | null | 7.5 | 6 |
CVE-2009-3110 | Race condition in the file transfer functionality in Symantec Altiris Deployment Solution 6.9.x before 6.9 SP3 Build 430 allows remote attackers to read sensitive files and prevent client updates by connecting to the file transfer port before the expected client does. | [
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9.176:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:sp1:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-8754-hm6g-jhw5 | A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections. | [] | null | null | 7.5 | null |
|
GHSA-c6v6-mvg4-h5hx | An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154. | [] | null | 7.8 | null | null |
|
GHSA-hmxv-f559-cmw6 | Windows Extensible Firmware Interface Security Feature Bypass Vulnerability | [] | null | 6.2 | null | null |
|
GHSA-854h-gmvf-x57p | com.novell.zenworks.inventory.rtr.actionclasses.wcreports in Novell ZENworks Configuration Management (ZCM) allows remote attackers to read arbitrary folders via the dirname variable. | [] | null | null | 7.5 | null |
|
GHSA-xm88-v4r8-x892 | Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/index.php. The attack vector is: The administrator clicks on the malicious link in the login state. | [] | null | null | null | null |
|
GHSA-57qf-82hh-2hmc | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting. | [] | null | 5.4 | null | null |
CVE-2024-57019 | TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "limit" parameter in setVpnAccountCfg. | [] | null | 8.8 | null | null |
|
GHSA-wgx9-jc59-6fmq | The lit program in Sun Flex License Manager (FlexLM) follows symlinks, which allows local users to modify arbitrary files. | [] | null | null | null | null |
|
GHSA-xqqr-5rg9-gj2h | Vulnerability in Compaq Tru64 UNIX edauth command. | [] | null | null | null | null |
|
CVE-2024-23973 | Silicon Labs Gecko OS HTTP GET Request Handling Stack-based Buffer Overflow | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. | [] | null | 8.8 | null | null |
GHSA-v95j-qhvj-8v9x | In all versions of GitLab CE/EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration. | [] | null | null | null | null |
|
GHSA-r3qg-qq2r-grgr | An issue was discovered in Poppler 0.71.0. There is a out-of-bounds read in EmbFile::save2 in FileSpec.cc, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating embedded files before save attempts. | [] | null | null | 6.5 | null |
|
GHSA-jq58-mjxh-8fp7 | The MainWP Child WordPress plugin before 4.1.8 does not validate the orderby and order parameter before using them in a SQL statement, leading to an SQL injection exploitable by high privilege users such as admin when the Backup and Staging by WP Time Capsule plugin is installed | [] | null | null | null | null |
|
CVE-2007-2128 | Unspecified vulnerability in the Sales Online component for Oracle E-Business Suite 11.5.10 has unknown impact and remote authenticated attack vectors, aka APPS08. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-w468-8qwj-58hh | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. | [] | null | 9.8 | null | null |
|
CVE-2024-10923 | Improper Neutralization vulnerability has been discovered in OpenText™ ALM Octane Management. | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ ALM Octane Management allows Stored XSS. The vulnerability could result in a remote code execution attack.
This issue affects ALM Octane Management: from 16.2.100 through 24.4. | [
"cpe:2.3:a:opentext:alm_octane:-:*:*:*:*:*:*:*"
] | 8.6 | null | null | null |
GHSA-724f-83mw-fgp7 | The apt-add-repository tool in Ubuntu Software Properties 0.75.x before 0.75.10.3, 0.80.x before 0.80.9.2, 0.81.x before 0.81.13.5, 0.82.x before 0.82.7.3, and 0.92.x before 0.92.8 does not properly check PPA GPG keys imported from a keyserver, which allows remote attackers to install arbitrary package repository GPG keys via a man-in-the-middle (MITM) attack. | [] | null | null | null | null |
|
GHSA-7gp6-ww33-8jvj | Unrestricted file upload vulnerability in PHPStore Real Estate allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension as a logo, then accessing it via a direct request to the file in realty/re_images/. | [] | null | null | null | null |
|
GHSA-wmwq-whw7-gm6q | The ShopLentor WordPress plugin before 2.5.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
CVE-2008-3267 | SQL injection vulnerability in mojoJobs.cgi in MojoJobs allows remote attackers to execute arbitrary SQL commands via the cat_a parameter. | [
"cpe:2.3:a:mojoscripts:mojojobs:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2005-1042 | Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count. | [
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-1378 | Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_pgHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands. | [
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
cisco-sa-iox-pt-hWGcPf7g | Cisco IOx Application Environment Path Traversal Vulnerability | A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system.
This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 6.5 | null | null |
GHSA-q7hf-qx95-6q2p | Buffer overflow in the Cisco Port Forwarder ActiveX control in cscopf.ocx, as distributed through the Clientless VPN feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 through 7.2 before 7.2(5.6), 8.0 before 8.0(5.26), 8.1 before 8.1(2.53), 8.2 before 8.2(5.18), 8.3 before 8.3(2.28), 8.2 before 8.4(2.16), and 8.6 before 8.6(1.1), allows remote attackers to execute arbitrary code via unspecified vectors, aka Bug ID CSCtr00165. | [] | null | null | null | null |
|
GHSA-22gh-3r9q-xf38 | Lacking Protection against HTTP Request Smuggling in mitmproxy | ImpactIn mitmproxy 7.0.2 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization.Unless you use mitmproxy to protect an HTTP/1 service, no action is required.PatchesThe vulnerability has been fixed in mitmproxy 7.0.3 and above.AcknowledgementsWe thank João Sobral (@chinchila) for responsibly disclosing this vulnerability to the mitmproxy team.Timeline**2021-09-08**: Received initial report for mitmproxy <= 6.0.2.**2021-09-08**: Requested clarification if 7.x is affected.**2021-09-10**: Received additional details, 7.x situation still unclear.**2021-09-13**: Internally determined that 7.x is also affected.**2021-09-13**: Shared initial fix with researcher.**2021-09-14**: Received confirmation that fix is working, but H2.TE/H2.CL should also be looked at.**2021-09-14**: Shared revised fix that includes additional H2.TE mitigations.**2021-09-14**: Received confirmation that revised fix is working.**2021-09-16**: Completed internal patch review.**2021-09-16**: Published patch release and advisory. | [] | 9.3 | 8.1 | null | null |
CVE-2016-5072 | OXID eShop before 2016-06-13 allows remote attackers to execute arbitrary code via a GET or POST request to the oxuser class. Fixed versions are Enterprise Edition v5.1.12, Enterprise Edition v5.2.9, Professional Edition v4.8.12, Professional Edition v4.9.9, Community Edition v4.8.12, Community Edition v4.9.9. | [
"cpe:2.3:a:oxidforge:oxid_eshop:*:*:*:*:community:*:*:*",
"cpe:2.3:a:oxidforge:oxid_eshop:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:oxidforge:oxid_eshop:*:*:*:*:enterprise:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-1999-0121 | Buffer overflow in dtaction command gives root access. | [] | null | null | null | 7.2 |
|
CVE-2021-25965 | Calibre-web - Admin Account Takeover via Cross-Site Request Forgery (CSRF) | In Calibre-web, versions 0.6.0 to 0.6.13 are vulnerable to Cross-Site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application. | [
"cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-qm6q-x38h-hpp4 | The Front End Users plugin for WordPress is vulnerable to SQL Injection via the 'UserSearchField' parameter in all versions up to, and including, 3.2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 4.9 | null | null |
|
CVE-2019-4381 | IBM i 7.27.3 Clustering could allow a local attacker to obtain sensitive information, caused by the use of advanced node failure detection using the REST API to interface with the HMC. An attacker could exploit this vulnerability to obtain HMC credentials. IBM X-Force ID: 162159. | [
"cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
CVE-2024-7537 | oFono QMI SMS Handling Out-Of-Bounds Read Information Disclosure Vulnerability | oFono QMI SMS Handling Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of SMS message lists. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23157. | [
"cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
GHSA-96pm-r5vr-mmq2 | nettools.php in PHP Net Tools 2.7.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the host parameter. | [] | null | null | null | null |
|
CVE-2023-36560 | ASP.NET Security Feature Bypass Vulnerability | ASP.NET Security Feature Bypass Vulnerability | [
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null |
CVE-2012-0589 | Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple iOS before 5.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0586, CVE-2012-0587, and CVE-2012-0588. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-p8w5-8452-95gq | The windows functionality in WebKit in Apple Safari before 5.0.4 allows remote attackers to bypass the Same Origin Policy, and force the upload of arbitrary local files from a client computer, via a crafted web site. | [] | null | null | null | null |
|
GHSA-wp5g-24xx-jcg4 | SENS v1.0 has a file upload vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-xxp6-vwcq-7x73 | Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section. | [] | null | 9.8 | null | null |
|
GHSA-p4rr-fgvx-ch95 | Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node. | [] | null | null | null | null |
|
GHSA-cfp2-8mw9-wg68 | An information exposure vulnerability exists in gitlab.com <v12.3.2, <v12.2.6, and <v12.1.10 when using the blocking merge request feature, it was possible for an unauthenticated user to see the head pipeline data of a public project even though pipeline visibility was restricted. | [] | null | 6.5 | null | null |
|
CVE-2023-25977 | WordPress CPT – Speakers Plugin <= 1.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 9seeds.Com CPT – Speakers plugin <= 1.1 versions. | [
"cpe:2.3:a:9seeds:cpt_-_speakers:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-f4gx-5j5p-43v5 | In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
PYSEC-2018-127 | null | An issue was discovered in Exiv2 0.26. readMetadata in jp2image.cpp allows remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. | [] | null | 6.5 | null | null |
GHSA-rvh5-gwx3-6h9w | D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function sub_2EF50. This vulnerability allows attackers to execute arbitrary commands via the manual-time-string parameter. | [] | null | 9.8 | null | null |
|
GHSA-fppg-744g-mv5h | Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
GHSA-hfv7-cww8-h574 | Online Car Wash Booking System v1.0 is vulnerable to SQL Injection via /ocwbs/admin/?page=bookings/view_details&id=. | [] | null | 9.8 | null | null |
|
CVE-2015-0667 | The Management Interface on Cisco Content Services Switch (CSS) 11500 devices 8.20.4.02 and earlier allows remote attackers to bypass intended restrictions on local-network device access via crafted SSH packets, aka Bug ID CSCut14855. | [
"cpe:2.3:o:cisco:content_services_switch_11500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2020:2664 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
CVE-2024-27789 | A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, macOS Monterey 12.7.5, macOS Ventura 13.6.7, macOS Sonoma 14.4. An app may be able to access user-sensitive data. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
RHSA-2020:4619 | Red Hat Security Advisory: frr security and bug fix update | frr: default permission issue eases information leaks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
CVE-2024-45007 | char: xillybus: Don't destroy workqueue from work item running on it | In the Linux kernel, the following vulnerability has been resolved:
char: xillybus: Don't destroy workqueue from work item running on it
Triggered by a kref decrement, destroy_workqueue() may be called from
within a work item for destroying its own workqueue. This illegal
situation is averted by adding a module-global workqueue for exclusive
use of the offending work item. Other work items continue to be queued
on per-device workqueues to ensure performance. | [] | null | null | null | null |
RHSA-2024:2410 | Red Hat Security Advisory: harfbuzz security update | harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
CVE-2020-6425 | Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*"
] | null | 5.4 | null | 5.8 |
|
GHSA-m7rq-39jm-x429 | Cross-Site Request Forgery (CSRF) vulnerability in Cynob IT Consultancy WP Custom Post RSS Feed allows Stored XSS. This issue affects WP Custom Post RSS Feed: from n/a through 1.0.0. | [] | null | 7.1 | null | null |
|
CVE-2023-41769 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2003-0434 | Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink. | [
"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xxf4-cqmv-x4mh | A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash. | [] | null | null | null | null |
|
GHSA-jx2c-g5jx-5fj7 | The Meeting Server in IBM Sametime 8.5.2 through 8.5.2.1 and 9.x through 9.0.0.1 does not send the appropriate HTTP response headers to prevent unwanted caching by a web browser, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation. | [] | null | null | null | null |
|
GHSA-h5h8-465r-2j7f | Huawei smart phones Emily-AL00A with software 8.1.0.106(SP2C00) and 8.1.0.107(SP5C00) have a Factory Reset Protection (FRP) bypass vulnerability. An attacker gets some user's smart phone and performs some special operations in the guide function. The attacker may exploit the vulnerability to bypass FRP function and use the phone normally. | [] | null | null | 6.8 | null |
|
GHSA-332f-m55f-3h9q | Zoho ManageEngine Desktop Central before 10.0.662 allows remote code execution by an authenticated user who has complete access to the Reports module. | [] | null | null | null | null |
|
CVE-2010-2323 | IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.11 on z/OS might allow attackers to obtain sensitive information by reading the default_create.log file that is associated with profile creation by the BBOWWPFx job and the zPMT. | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:zos:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-13593 | The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation in Texas Instruments SimpleLink SIMPLELINK-CC2640R2-SDK through 2.2.3 allows the Diffie-Hellman check during the Secure Connection pairing to be skipped if the Link Layer encryption setup is performed earlier. An attacker in radio range can achieve arbitrary read/write access to protected GATT service data, cause a denial of service, or possibly control a device's function by establishing an encrypted session with an unauthenticated Long Term Key (LTK). | [
"cpe:2.3:a:ti:simplelink-cc2640r2_software_development_kit:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 |
|
GHSA-r4rq-634f-573c | Cross-site scripting (XSS) vulnerability in the echo functionality on IBM WebSphere DataPower SOA appliances with firmware 3.8.2, 4.0, 4.0.1, 4.0.2, and 5.0.0 allows remote attackers to inject arbitrary web script or HTML via a SOAP message, as demonstrated by the XML Firewall, Multi Protocol Gateway (MPGW), Web Service Proxy, and Web Token services. | [] | null | null | null | null |
|
CVE-2017-7815 | On pages containing an iframe, the "data:" protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view. Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality. This vulnerability affects Firefox < 56. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.