id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-41118 | ReDoS in DynamicPageList3 | The DynamicPageList3 extension is a reporting tool for MediaWiki, listing category members and intersections with various formats and details. In affected versions unsanitised input of regular expression date within the parameters of the DPL parser function, allowed for the possibility of ReDoS (Regex Denial of Service). This has been resolved in version 3.3.6. If you are unable to update you may also set `$wgDplSettings['functionalRichness'] = 0;` or disable DynamicPageList3 to mitigate. | [
"cpe:2.3:a:dynamicpagelist3_project:dynamicpagelist3:*:*:*:*:*:mediawiki:*:*"
] | null | 5.3 | null | null |
GHSA-4hxx-7755-cw67 | Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php. | [] | null | null | null | null |
|
GHSA-j5jv-8x67-rwv6 | In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-79164722. | [] | null | null | 7.5 | null |
|
CVE-2023-50861 | WordPress HUSKY plugin <= 1.3.4.3 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.
| [] | null | 4.3 | null | null |
GHSA-5579-734j-m88m | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names. | [] | null | null | null | null |
|
GHSA-wg5v-689x-wgmp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riosis Private Limited Rio Photo Gallery allows Reflected XSS. This issue affects Rio Photo Gallery: from n/a through 0.1. | [] | null | 7.1 | null | null |
|
RHSA-2016:1853 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update and bug fix update | libarchive: Archive Entry with type 1 (hardlink), but has a non-zero data size file overwrite | [
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | 7.5 | null |
GHSA-g536-h677-2w32 | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | [] | null | 9.8 | null | null |
|
CVE-2014-8330 | Cross-site scripting (XSS) vulnerability in EspoCRM allows remote authenticated users to inject arbitrary web script or HTML via the Name field in a new account. | [
"cpe:2.3:a:espocrm:espocrm:-:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2005-0656 | Multiple cross-site scripting (XSS) vulnerabilities in auraCMS 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) hits parameter to hits.php, (2) query parameter to index.php, or (3) theCount parameter to counter.php. | [
"cpe:2.3:a:arif_supriyanto:auracms:1.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-57w2-43hc-hjm2 | The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. | [] | null | 7.5 | null | null |
|
CVE-2006-5706 | Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2021-30130 | phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. | [
"cpe:2.3:a:phpseclib:phpseclib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2017-1000025 | GNOME Web (Epiphany) 3.23 before 3.23.5, 3.22 before 3.22.6, 3.20 before 3.20.7, 3.18 before 3.18.11, and prior versions, is vulnerable to a password manager sweep attack resulting in the remote exfiltration of stored passwords for a selected set of websites. | [
"cpe:2.3:a:gnome:epiphany:3.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:epiphany:3.23.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-xg6w-qq7g-f5fh | Stack overflow vulnerability in function gmalloc in goo/gmem.cc in xpdf 4.04, allows local attackers to cause a denial of service. | [] | null | 5.5 | null | null |
|
GHSA-3ggh-w4r5-27j4 | An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-j2qq-rw4v-jjx2 | An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash. | [] | null | 8.8 | null | null |
|
GHSA-66v6-qf5f-pgh2 | ** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability was discovered in Avaya Aura Utility Services that may potentially allow a local user to execute specially crafted scripts as a privileged user. Affects all 7.x versions of Avaya Aura Utility Services. | [] | null | 8.8 | null | null |
|
RHSA-2022:1665 | Red Hat Security Advisory: gzip security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.8 | null | null |
CVE-2025-30684 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
GHSA-vpr7-cgq2-g5rr | In the Linux kernel, the following vulnerability has been resolved:net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fteWhen adding a rule with 32 destinations, we hit the following out-of-band
access issue:BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte+0x18ee/0x1e70This patch fixes the issue by both increasing the allocated buffers to
accommodate for the needed actions and by checking the number of actions
to prevent this issue when a rule with too many actions is provided. | [] | null | 5.5 | null | null |
|
GHSA-g3p5-mf5x-xggv | Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain). Supported versions that are affected are 14.5, 14.6 and 14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H). | [] | null | 6 | null | null |
|
CVE-2010-0517 | Heap-based buffer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with M-JPEG encoding, which causes QuickTime to calculate a buffer size using height and width fields, but to use a different field to control the length of a copy operation. | [
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2017-18700 | Certain NETGEAR devices are affected by stored XSS. This affects D6400 before 1.0.0.60, D7000 before 1.0.1.50, D8500 before 1.0.3.29, EX6200 before 1.0.3.84, EX7000 before 1.0.0.60, R6250 before 1.0.4.16, R6300v2 before 1.0.4.18, R6400 before 1.01.32, R6400v2 before 1.0.2.44, R6700 before 1.0.1.36, R6900 before 1.0.1.34, R6900P before 1.3.0.8, R7000 before 1.0.9.14, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7300DST before 1.0.0.56, R7900 before 1.0.1.26, R8000 before 1.0.4.4, R8300 before 1.0.2.106, R8500 before 1.0.2.106, R9000 before 1.0.2.52, WNDR3400v3 before 1.0.1.16, WNR3500Lv2 before 1.2.0.46, and WNDR3700v5 before 1.1.0.48. | [
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*"
] | null | null | 5.2 | null |
|
RHSA-2022:6094 | Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update | golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
CVE-2018-18009 | dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials. | [
"cpe:2.3:o:dlink:dir-140l_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-640l_firmware:1.01ru:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-jw2p-mf2f-vvwp | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
GHSA-2j3r-j4h7-v6hh | The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download. | [] | null | null | null | null |
|
CVE-2012-0719 | Cross-site scripting (XSS) vulnerability in IBM Tivoli Endpoint Manager (TEM) 8 before 8.2 patch 3 allows remote attackers to inject arbitrary web script or HTML via the ScheduleParam parameter to the webreports program. | [
"cpe:2.3:a:ibm:tivoli_endpoint_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_endpoint_manager:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_endpoint_manager:8.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-37356 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. Crafted data in a JPG file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17630. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
CVE-2009-0507 | IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member. | [
"cpe:2.3:a:ibm:websphere_process_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_process_server:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_process_server:6.1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2006-5875 | eoc.py in Enemies of Carlotta (EoC) before 1.2.4 allows remote attackers to execute arbitrary commands via shell metacharacters in an "SMTP level e-mail address". | [
"cpe:2.3:a:enemies_of_carlotta:enemies_of_carlotta:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:enemies_of_carlotta:enemies_of_carlotta:1.2.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2025:2359 | Red Hat Security Advisory: firefox security update | firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
CVE-2024-47604 | XSS vulnerability in NuGetGallery HTML attributes handling | NuGet Gallery is a package repository that powers nuget.org. The NuGetGallery has a security vulnerability in its handling of HTML element attributes, which allows an attacker to execute arbitrary HTML or Javascript code in a victim's browser. | [
"cpe:2.3:a:microsoft:nugetgallery:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2023-33552 | Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image. | [
"cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-j2wc-9599-j92r | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file. | [] | null | 6.5 | null | null |
|
CVE-2017-6011 | An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the "simple_vec" function in the "extract.c" source file. This affects icotool. | [
"cpe:2.3:a:icoutils_project:icoutils:0.31.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2018-6080 | Lack of access control checks in Instrumentation in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to obtain memory metadata from privileged processes . | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2023-25875 | Adobe Substance 3D Stager OBJ File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2009-3840 | The embedded database engine service (aka ovdbrun.exe) in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to cause a denial of service (daemon crash) via an invalid Error Code field in a packet. | [
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-1053 | Multiple cross-site scripting (XSS) vulnerabilities in orderwiz.php in ModernBill 4.3.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) c_code or (2) aid parameters. | [
"cpe:2.3:a:moderngigabyte:modernbill:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-4jr9-pm2m-4f43 | Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets. | [] | null | null | null | null |
|
RHSA-2024:8047 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
GHSA-rp3p-7w43-mphh | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
GHSA-rrv9-xfv2-43m6 | In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Fix general protection fault in run_is_mapped_fullFixed deleating of a non-resident attribute in ntfs_create_inode()
rollback. | [] | null | 5.5 | null | null |
|
CVE-2020-24345 | JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option | [
"cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-frv7-rf72-j8fp | Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument. | [] | null | null | null | null |
|
GHSA-9hpv-r424-hr95 | When dynamic templates are used (OTRSTicketForms), admin can use OTRS tags which are not masked properly and can reveal sensitive information. This issue affects: OTRS AG OTRSTicketForms 6.0.x version 6.0.40 and prior versions; 7.0.x version 7.0.29 and prior versions; 8.0.x version 8.0.3 and prior versions. | [] | null | null | null | null |
|
CVE-2002-0495 | csSearch.cgi in csSearch 2.3 and earlier allows remote attackers to execute arbitrary Perl code via the savesetup command and the setup parameter, which overwrites the setup.cgi configuration file that is loaded by csSearch.cgi. | [
"cpe:2.3:a:cgiscript:cssearch_professional:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-j274-79c7-46r9 | csstart program in iCal 2.1 Patch 2 searches for the cshttpd program in the current working directory, which allows local users to gain root privileges by creating a Trojan Horse cshttpd program in a directory and calling csstart from that directory. | [] | null | null | null | null |
|
CVE-2023-31427 | Knowledge of full path name | Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled. | [
"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-46394 | An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r39p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0. | [
"cpe:2.3:a:arm:avalon_gpu_kernel_driver:r41p0:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2014-0200 | The Red Hat Enterprise Virtualization Manager reports (rhevm-reports) package before 3.3.3-1 uses world-readable permissions on the datasource configuration file (js-jboss7-ds.xml), which allows local users to obtain sensitive information by reading the file. | [
"cpe:2.3:a:redhat:rhevm-reports:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:rhevm-reports:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:rhevm-reports:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:rhevm-reports:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:rhevm-reports:3.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-vccc-5v6j-w7p6 | Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Userreview module before 1.19 2006/09/12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-8wpm-73cm-3g25 | Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component. | [] | null | null | null | null |
|
CVE-2022-46155 | Airtable.js credentials exposed in browser builds | Airtable.js is the JavaScript client for Airtable. Prior to version 0.11.6, Airtable.js had a misconfigured build script in its source package. When the build script is run, it would bundle environment variables into the build target of a transpiled bundle. Specifically, the AIRTABLE_API_KEY and AIRTABLE_ENDPOINT_URL environment variables are inserted during Browserify builds due to being referenced in Airtable.js code. This only affects copies of Airtable.js built from its source, not those installed via npm or yarn. Airtable API keys set in users’ environments via the AIRTABLE_API_KEY environment variable may be bundled into local copies of Airtable.js source code if all of the following conditions are met: 1) the user has cloned the Airtable.js source onto their machine, 2) the user runs the `npm prepare` script, and 3) the user' has the AIRTABLE_API_KEY environment variable set. If these conditions are met, a user’s local build of Airtable.js would be modified to include the value of the AIRTABLE_API_KEY environment variable, which could then be accidentally shipped in the bundled code. Users who do not meet all three of these conditions are not impacted by this issue. Users should upgrade to Airtable.js version 0.11.6 or higher; or, as a workaround unset the AIRTABLE_API_KEY environment variable in their shell and/or remove it from your .bashrc, .zshrc, or other shell configuration files. Users should also regenerate any Airtable API keys they use, as the keysy may be present in bundled code. | [
"cpe:2.3:a:airtable:airtable:*:*:*:*:*:node.js:*:*"
] | null | 7.6 | null | null |
CVE-2018-11720 | Xovis PC2, PC2R, and PC3 devices through 3.6.0 allow Directory Traversal. | [
"cpe:2.3:o:xovis:pc2r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xovis:pc2r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xovis:pc3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xovis:pc3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xovis:pc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xovis:pc2:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-20181 | rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution. | [
"cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2019-3667 | DLL Search Order Hijacking | DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker. | [
"cpe:2.3:a:mcafee:techcheck:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
GHSA-xvfq-f68m-7mwg | In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server. | [] | null | 5.9 | null | null |
|
CVE-2021-36385 | A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell. | [
"cpe:2.3:a:cerner:mobile_care:5.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2024-35200 | NGINX HTTP/3 QUIC vulnerability | When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate. | [
"cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:nginx:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2018-20881 | cPanel before 74.0.8 allows self stored XSS on the Security Questions login page (SEC-446). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-4vc4-pm9p-xmjm | In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command. | [] | null | null | null | null |
|
CVE-2017-18183 | An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc. | [
"cpe:2.3:a:qpdf_project:qpdf:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2020-6155 | A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | [
"cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-252h-69rw-g2rp | The str_buf_cat function in string.c in Ruby 1.9.3, 2.0.0, and 2.1 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string. | [] | null | null | null | null |
|
RHSA-2024:3636 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) jetty: stop accepting new connections from valid clients jenkins-2-plugins: git-server plugin arbitrary file read vulnerability jenkins-2-plugins: matrix-project plugin path traversal vulnerability golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin jenkins-plugin/script-security: sandbox bypass via crafted constructor bodies jenkins-plugin/script-security: sandbox bypass via sandbox-defined classes | [
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 8.8 | null | null |
CVE-2024-25255 | Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module. NOTE: multiple third parties report that this is intended behavior. | [
"cpe:2.3:a:sublimetext:sublime_text_4:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-hj32-3rpc-p9j5 | IBM BigFix Platform 9.2 and 9.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 140761. | [] | null | null | 8.8 | null |
|
GHSA-4ggc-fh42-w6g4 | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SVG file. | [] | null | null | null | null |
|
GHSA-4x83-gp9m-6f2g | An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to delete arbitrary files via servlet directory traversal. | [] | null | null | 6.5 | null |
|
RHSA-2003:390 | Red Hat Security Advisory: : Updated gnupg packages disable ElGamal keys | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-p5c5-45cp-hjw4 | vim is vulnerable to Heap-based Buffer Overflow | [] | null | 8 | null | null |
|
GHSA-vqpf-hpm5-9vf4 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [] | null | 7.5 | null | null |
|
CVE-2024-32163 | CMSeasy 7.7.7.9 is vulnerable to code execution. | [
"cpe:2.3:a:cmseasy:cmseasy:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-wjjg-qcjc-rrj3 | Vulnerability in authentication process for SMTP service in Microsoft Windows 2000 allows remote attackers to use incorrect credentials to gain privileges and conduct activities such as mail relaying. | [] | null | null | null | null |
|
GHSA-49rq-5w7r-4rrp | In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls. | [] | null | 7.8 | null | null |
|
GHSA-g623-x8rq-wrr5 | Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381. | [] | null | null | null | null |
|
GHSA-mrwv-wxq5-q8v6 | Cross-site request forgery (CSRF) vulnerability in the WP Limit Posts Automatically plugin 0.7 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the lpa_post_letters parameter in the wp-limit-posts-automatically.php page to wp-admin/options-general.php. | [] | null | null | null | null |
|
GHSA-h84v-w3gp-m42f | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
GHSA-m6vv-x5w9-cwmh | IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 202680. | [] | null | null | null | null |
|
GHSA-v7w7-wwgq-qmfw | An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | [] | null | 5.4 | null | null |
|
CVE-2025-2239 | Absolute Path Disclosure Vulnerability in Hillstone Next Generation FireWall | Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23. | [] | null | 5.3 | null | null |
CVE-2024-46684 | binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined | In the Linux kernel, the following vulnerability has been resolved:
binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined
create_elf_fdpic_tables() does not correctly account the space for the
AUX vector when an architecture has ELF_HWCAP2 defined. Prior to the
commit 10e29251be0e ("binfmt_elf_fdpic: fix /proc/<pid>/auxv") it
resulted in the last entry of the AUX vector being set to zero, but with
that change it results in a kernel BUG.
Fix that by adding one to the number of AUXV entries (nitems) when
ELF_HWCAP2 is defined. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2024-31755 | cJSON v1.7.17 was discovered to contain a segmentation violation, which can trigger through the second parameter of function cJSON_SetValuestring at cJSON.c. | [
"cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
|
GHSA-6j6v-f6cj-wwmw | DedeCMS v6.1.9 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add Administrator accounts and modify Admin passwords. | [] | null | 8.8 | null | null |
|
GHSA-2mhf-732c-q449 | A cross-site scripting (XSS) vulnerability in the administration web panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote attackers to inject arbitrary web script or HTML via the language parameter. | [] | null | null | null | null |
|
CVE-2024-7361 | SourceCodester Tracking Monitoring Management System ajax.php sql injection | A vulnerability classified as critical was found in SourceCodester Tracking Monitoring Management System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_establishment. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273340. | [
"cpe:2.3:a:sourcecodester:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2017-12511 | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-xj5p-wxr5-6r73 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Naa986 WP Stripe Checkout.This issue affects WP Stripe Checkout: from n/a through 1.2.2.37. | [] | null | 7.5 | null | null |
|
CVE-2018-6547 | plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user. | [
"cpe:2.3:a:plays.tv:plays.tv:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 9.4 |
|
GHSA-h339-q93v-5mgr | The WP Not Login Hide (WPNLH) WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-gpmj-wcx3-mvp9 | Stack-based buffer overflow in Nostra DivX Player 2.1, 2.2.00.0, and possibly earlier, allows remote attackers to execute arbitrary code via a long string in an M3U file. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-rvwv-8rrq-q84r | In the Linux kernel, the following vulnerability has been resolved:tipc: force a dst refcount before doing decryptionAs it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before
entering the xfrm type handlers"):"Crypto requests might return asynchronous. In this case we leave the
rcu protected region, so force a refcount on the skb's destination
entry before we enter the xfrm type input/output handlers."On TIPC decryption path it has the same problem, and skb_dst_force()
should be called before doing decryption to avoid a possible crash.Shuang reported this issue when this warning is triggered:[] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]
[] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug
[] Workqueue: crypto cryptd_queue_worker
[] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]
[] Call Trace:
[] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]
[] tipc_rcv+0xcf5/0x1060 [tipc]
[] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]
[] cryptd_aead_crypt+0xdb/0x190
[] cryptd_queue_worker+0xed/0x190
[] process_one_work+0x93d/0x17e0 | [] | null | null | null | null |
|
CVE-2001-1529 | Buffer overflow in rpc.yppasswdd (yppasswd server) in AIX allows attackers to gain unauthorized access via a long string. NOTE: due to lack of details in the vendor advisory, it is not clear if this is the same issue as CVE-2001-0779. | [
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-7573 | Relevanssi Live Ajax Search <= 2.4 - Unauthenticated WP_Query Argument Injection | The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts. | [
"cpe:2.3:a:relevanssi:relevanssi-live-ajax-search:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2014-3065 | Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache. | [
"cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2013-0205 | Cross-site request forgery (CSRF) vulnerability in the RESTful Web Services (restws) module 7.x-1.x before 7.x-1.2 and 7.x-2.x before 7.x-2.0-alpha4 for Drupal allows remote attackers to hijack the authentication of arbitrary users via unknown vectors. | [
"cpe:2.3:a:restful_web_services_project:restful_web_services:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:-:*:*:*:drupal:*:*",
"cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha2:*:*:*:drupal:*:*",
"cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha3:*:*:*:drupal:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-ph95-5jr4-4x7p | Multiple cross-site scripting (XSS) vulnerabilities in EncapsGallery 1.11.2 allow remote attackers to inject arbitrary web script or HTML via the file parameter to (1) watermark.php and (2) catalog_watermark.php in core/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.