id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2012-1346
Cisco Emergency Responder 8.6 and 9.2 allows remote attackers to cause a denial of service (CPU consumption) by sending malformed UDP packets to the CERPT port, aka Bug ID CSCtx38369.
[ "cpe:2.3:a:cisco:emergency_responder:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:emergency_responder:9.2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-1666
IBM DataPower Gateway 2018.4.1.0, 7.6.0.0 through 7.6.0.11, 7.5.2.0 through 7.5.2.18, 7.5.1.0 through 7.5.1.18, 7.5.0.0 through 7.5.0.19, and 7.7.0.0 through 7.7.1.3 could allow an authenticated user to inject arbitrary messages that would be displayed on the UI. IBM X-Force ID: 144892.
[ "cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:2018.4.1.0:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-wc43-73w7-x2f5
Ory Kratos's setting required_aal `highest_available` does not properly respect code + mfa credentials
PreconditionsThe `code` login method is enabled with the `passwordless_enabled` flag set to `true` .A 2FA method such as `totp` is enabled.`required_aal` of the whomai check or the settings flow is set to `highest_available`. AAL stands for Authenticator Assurance Levels and can range from 0 (no factor) to 2 (two factors).A user uses the `code` method as the **only** login method available. They do not have a password or any other first factor credential enabled.The user has 2FA enabled.The user’s `available_aal` is incorrectly stored in the database as `aal1` or `aal0` or `NULL`.A user signs in using the code method, but does not complete the 2FA challenge.**Example server configuration**Below you will find an vulnerable example configuration. Keep in mind that, for the account to be vulnerable, the account must have no first factor except the `code` method enabled plus a second factor.ImpactGiven the preconditions, the `highest_available` setting will incorrectly assume that the identity’s highest available AAL is `aal1` even though it really is `aal2`. This means that the `highest_available` configuration will act as if the user has only one factor set up, for that particular user. This means that they can call the settings and whoami endpoint without a `aal2` session, even though that should be disallowed.An attacker would need to steal or guess a valid login OTP of a user who has only OTP for login enabled and who has an incorrect `available_aal` value stored, to exploit this vulnerability.All other aspects of the session (e.g. the session’s aal) are not impacted by this issue.On Ory Network, only 0,00066% of registered users were affected by this issue, and most of those users appeared to be test users. Their respective AAL values have since been updated and they are no longer vulnerable to this attack.PatchesVersion 1.3.0 is not affected by this issue.WorkaroundsIf you require 2FA please disable the passwordless code login method. If that is not possible, check the sessions `aal` to identify if the user has `aal1` or `aal2`.
[]
5.9
4.4
null
null
CVE-2024-41171
A vulnerability has been identified in SINUMERIK 828D V4 (All versions), SINUMERIK 828D V5 (All versions < V5.24), SINUMERIK 840D sl V4 (All versions), SINUMERIK ONE (All versions < V6.24). Affected devices do not properly enforce access restrictions to scripts that are regularly executed by the system with elevated privileges. This could allow an authenticated local attacker to escalate their privileges in the underlying system.
[ "cpe:2.3:o:siemens:sinumerik_840d_sl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_828d_firmware:*:*:*:*:*:*:*:*" ]
9.3
8.8
null
null
CVE-2015-2646
Unspecified vulnerability in the Enterprise Manager for Oracle Database component in Oracle Enterprise Manager Grid Control EM Base Platform: 11.1.0.1; EM Plugin for DB: 12.1.0.5, 12.1.0.6, 12.1.0.7; EM DB Control: 11.1.0.7, 11.2.0.3, and 11.2.0.4 allows remote attackers to affect integrity via unknown vectors related to Content Management.
[ "cpe:2.3:a:oracle:enterprise_manager_database_control:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_grid_control:11.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-46662
Roxio Creator LJB starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. The affected product and versions are as follows: Roxio Creator LJB version number 12.2 build number 106B62B, version number 12.2 build number 106B63A, version number 12.2 build number 106B69A, version number 12.2 build number 106B71A, and version number 12.2 build number 106B74A)
[ "cpe:2.3:a:corel:roxio_creator_ljb:12.2:build_106b62b:*:*:*:*:*:*", "cpe:2.3:a:corel:roxio_creator_ljb:12.2:build_106b63a:*:*:*:*:*:*", "cpe:2.3:a:corel:roxio_creator_ljb:12.2:build_106b69a:*:*:*:*:*:*", "cpe:2.3:a:corel:roxio_creator_ljb:12.2:build_106b71a:*:*:*:*:*:*", "cpe:2.3:a:corel:roxio_creator_ljb:12.2:build_106b74a:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2020-35758
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a Authentication Bypass in the Web Interface. This interface does not properly restrict access to internal functionality. Despite presenting a password login page on first access, authentication is not required to access privileged functionality. As such, it's possible to directly access APIs that should not be exposed to an unauthenticated user.
[ "cpe:2.3:o:librewireless:ls9_firmware:7040:*:*:*:*:*:*:*", "cpe:2.3:h:librewireless:ls9:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2022-34878
VICIDial 2.14b0.5 SVN 3550 was discovered to contain a SQL injection vulnerability at /vicidial/user_stats.php.
SQL Injection vulnerability in User Stats interface (/vicidial/user_stats.php) of VICIdial via the file_download parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.
[ "cpe:2.3:a:vicidial:vicidial:2.14b0.5:3555:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-6m5g-4p44-6rcf
Sun Java System Identity Manager (IdM) 7.0 through 8.0 does not properly restrict access to the System Configuration object, which allows remote authenticated administrators and possibly remote attackers to have an unspecified impact by modifying this object.
[]
null
null
null
null
RHSA-2022:0274
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
GHSA-gfh2-7jg5-653p
Denial of Service in docker2aci
docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain.
[]
null
null
4
null
GHSA-2f5v-p83c-vrjp
Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL.
[]
null
null
null
null
CVE-2023-25733
The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-v54f-xcmp-43cr
Deserialization of Untrusted Data in Apache ShardingSphere
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere&#39;s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
[]
null
9.8
null
null
GHSA-52vj-29px-76m7
The undocumented TRACK method in Microsoft Internet Information Services (IIS) 5.0 returns the content of the original request in the body of the response, which makes it easier for remote attackers to steal cookies and authentication credentials, or bypass the HttpOnly protection mechanism, by using TRACK to read the contents of the HTTP headers that are returned in the response, a technique that is similar to cross-site tracing (XST) using HTTP TRACE.
[]
null
null
null
null
CVE-2022-41913
Discourse-calendar exposes members of hidden groups
Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it's possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it.
[ "cpe:2.3:a:discourse:calendar:0.2:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-m924-ggx6-jfpw
The default configuration of EMC RecoverPoint Appliance (RPA) 4.1 before 4.1.0.1 does not enable a firewall, which allows remote attackers to obtain potentially sensitive information about open ports, or cause a denial of service, by sending packets to many ports.
[]
null
null
null
null
ICSA-21-103-14
Siemens Nucleus DNS (Update A)
The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
[]
null
5.3
null
null
CVE-2017-1598
IBM Security Guardium 10.0 Database Activity Monitor uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 132611.
[ "cpe:2.3:a:ibm:security_guardium:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium:10.1.3:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2025:2025
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.6 security update
wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" ]
null
6.1
null
null
GHSA-v249-f24w-8xvj
Vulnerability in the Oracle iProcurement component of Oracle E-Business Suite (subcomponent: E-Content Manager Catalog). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iProcurement. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iProcurement accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
7.5
null
GHSA-7chq-xr5g-6crp
A vulnerability was found in Novastar CX40 up to 2.44.0. It has been rated as critical. This issue affects the function getopt of the file /usr/nova/bin/netconfig of the component NetFilter Utility. The manipulation of the argument cmd/netmask/pipeout/nettask leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
5.5
null
null
GHSA-pg3g-2g25-jr6h
The Lexicata plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link.
[]
null
6.1
null
null
CVE-2007-2913
Cross-site scripting (XSS) vulnerability in index.php in ClonusWiki .5 allows remote attackers to inject arbitrary web script or HTML via the query parameter.
[ "cpe:2.3:a:clonuswiki:clonuswiki:0.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-3535
Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user&rsquo;s account.
[ "cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:windows:*:*" ]
null
7.8
null
null
ICSA-20-070-05
Johnson Controls Metasys
An XXE vulnerability exists that may allow an attacker to harvest ASCII files from the server.CVE-2020-9044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-wrcc-xjp4-3f52
Oxygen XML Editor 21.1.1 allows XXE to read any file.
[]
null
7.5
null
null
GHSA-7763-j2c2-xh5f
SQL injection vulnerability in index.php in BugPort 1.147 allows remote attackers to execute arbitrary SQL commands via the (1) devWherePair[0], (2) orderBy, and (3) where parameters.
[]
null
null
null
null
CVE-2003-1347
Multiple cross-site scripting (XSS) vulnerabilities in Geeklog 1.3.7 allow remote attackers to inject arbitrary web script or HTML via the (1) cid parameter to comment.php, (2) uid parameter to profiles.php, (3) uid to users.php, and (4) homepage field.
[ "cpe:2.3:a:geeklog:geeklog:1.3.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-34957
Foxit PDF Editor Highlight Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor Highlight Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14358.
[ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:phantompdf:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2015-3974
EasyIO EasyIO-30P-SF controllers with firmware before 0.5.21 and 2.x before 2.0.5.21, as used in Accutrol, Bar-Tech Automation, Infocon/EasyIO, Honeywell Automation India, Johnson Controls, SyxthSENSE, Transformative Wave Technologies, Tridium Asia Pacific, and Tridium Europe products, have a hardcoded password, which makes it easier for remote attackers to obtain access via unspecified vectors.
[ "cpe:2.3:o:easyio:easyio-30p-sf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:easyio:easyio-30p-sf:*:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2014-4820
Cross-site scripting (XSS) vulnerability in IBM Integration Bus Manufacturing Pack 1.x before 1.0.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:integration_bus_manufacturing_pack:1.0.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-wqgg-q2mf-p44h
The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
[]
null
null
null
null
GHSA-672w-754p-3r43
An issue was discovered in OnePlus One, X, 2, 3, 3T, and 5 devices with OxygenOS 5.0 and earlier. The attacker can reboot the device into the Qualcomm Emergency Download (EDL) mode through ADB or by using Volume-Up when connected to USB, which in turn could allow for downgrading partitions such as the Android Bootloader.
[]
null
6.8
null
null
CVE-2000-0704
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.
[ "cpe:2.3:a:freewnn:freewnn:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:freewnn:freewnn:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:freewnn:freewnn:1.1.1_axxx:*:*:*:*:*:*:*", "cpe:2.3:a:omron:worldview:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.2tl:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.5tl:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.8:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2012-3250
Unspecified vulnerability in HP Service Manager Server 7.11, 9.21, and 9.30, and HP Service Center Server 6.28, allows remote attackers to cause a denial of service via unknown vectors.
[ "cpe:2.3:h:hp:service_center_server:6.2.8:*:*:*:*:*:*:*", "cpe:2.3:h:hp:service_manager_server:7.11:*:*:*:*:*:*:*", "cpe:2.3:h:hp:service_manager_server:9.21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:service_manager_server:9.30:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-1999-0778
Buffer overflow in Xi Graphics Accelerated-X server allows local users to gain root access via a long display or query parameter.
[ "cpe:2.3:a:xi_graphics:accelerated-x_server:4:*:*:*:*:*:*:*", "cpe:2.3:a:xi_graphics:accelerated-x_server:5:*:*:*:*:*:*:*" ]
null
null
null
7.2
RHSA-2022:0405
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
undertow: client side invocation timeout raised when calling over HTTP2
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
7.5
null
null
GHSA-34x8-fgc3-8hvh
Adobe After Effects versions 22.0 (and earlier) and 18.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-xxm4-8498-pwrr
Multiple SQL injection vulnerabilities in index.php in Insanely Simple Blog 0.5 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter, or (2) the term parameter in a search action. NOTE: the current_subsection parameter is already covered by CVE-2007-3889.
[]
null
null
null
null
CVE-2015-2542
Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2023-41175
Libtiff: potential integer overflow in raw2tiff.c
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2024-11662
welliamcao OpsManage API Endpoint deploy_api.py deploy_host_vars deserialization
A vulnerability was found in welliamcao OpsManage 3.0.1/3.0.2/3.0.3/3.0.4/3.0.5. It has been rated as critical. This issue affects the function deploy_host_vars of the file /apps/api/views/deploy_api.py of the component API Endpoint. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:welliamcao:opsmanage:*:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-qpg5-hjqr-x928
The droid Survey Offline Forms (aka com.contact.droidSURVEY) application 2.5.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2021-32919
An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another server (when this option is enabled).
[ "cpe:2.3:a:prosody:prosody:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
CVE-2012-2240
scripts/dscverify.pl in devscripts before 2.12.3 allows remote attackers to execute arbitrary commands via unspecified vectors related to "arguments to external commands."
[ "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-9h55-298f-39qv
The Themify Builder plugin for WordPress is vulnerable to unauthorized post duplication due to missing checks on the duplicate_page_ajaxify function in all versions up to, and including, 7.6.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate and view private or draft posts created by other users that otherwise shouldn't be accessible to them.
[]
null
4.3
null
null
GHSA-qv8r-3p22-q7wp
Stack-based buffer overflow in PQCore.exe in Print Manager Plus 2008 Client Billing and Authentication 7.0.127.16 allows remote attackers to cause a denial of service (service outage) via a series of long packets to TCP port 48101.
[]
null
null
null
null
CVE-2024-29208
An Unverified Password Change could allow a malicious actor with API access to the device to change the system password without knowing the previous password. Affected Products: UniFi Connect EV Station (Version 1.1.18 and earlier) UniFi Connect EV Station Pro (Version 1.1.18 and earlier) UniFi Connect Display (Version 1.9.324 and earlier) UniFi Connect Display Cast (Version 1.6.225 and earlier) Mitigation: Update UniFi Connect Application to Version 3.10.7 or later. Update UniFi Connect EV Station to Version 1.2.15 or later. Update UniFi Connect EV Station Pro to Version 1.2.15 or later. Update UniFi Connect Display to Version 1.11.348 or later. Update UniFi Connect Display Cast to Version 1.8.255 or later.
[ "cpe:2.3:a:ubiquiti:unifi_connect_ev_station:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:ubiquiti:unifi_connect_ev_station_pro:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:ubiquiti:unifi_connect_display:1.11.348:*:*:*:*:*:*:*", "cpe:2.3:a:ubiquiti:unifi_connect_display_cast:1.8.255:*:*:*:*:*:*:*" ]
null
null
2.2
null
CVE-2018-3867
An exploitable stack-based buffer overflow vulnerability exists in the samsungWifiScan callback notification of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly handles the answer received from a smart camera, leading to a buffer overflow on the stack. An attacker can send a series of HTTP requests to trigger this vulnerability.
[ "cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*" ]
null
null
9.9
null
CVE-2023-41994
A logic issue was addressed with improved checks This issue is fixed in macOS Sonoma 14. A camera extension may be able to access the camera view from apps other than the app for which it was granted permission.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-43491
Microsoft Windows Update Remote Code Execution Vulnerability
Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order. Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support.
[ "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20766:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20766:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*" ]
null
9.8
null
null
GHSA-jrxx-9vqx-cj26
The FeedWordPress plugin before 2022.0123 is affected by a Reflected Cross-Site Scripting (XSS) within the "visibility" parameter.
[]
null
null
null
null
GHSA-6343-5v5c-grr3
Beijing Huorong Internet Security 5.0.55.2 allows a non-admin user to escalate privileges by injecting code into a process, and then waiting for a Huorong services restart or a system reboot.
[]
null
null
null
null
GHSA-qg6j-cgpv-37w6
The Mime Mail module 6.x-1.x before 6.x-1.1 for Drupal does not properly restrict access to files outside Drupal's publish files directory, which allows remote authenticated users to send arbitrary files as attachments.
[]
null
null
null
null
CVE-2015-2201
Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows VisualRF remote OS command execution and file disclosure by administrative users.
[ "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-2vx6-fcw6-hpr6
Reference counting error in pyo3
An issue was discovered in the pyo3 crate before 0.12.4 for Rust. There is a reference-counting error and use-after-free in From<Py<T>>.
[]
null
5.5
null
null
CVE-2022-22211
Junos OS Evolved: PTX Series: Multiple FPCs become unreachable due to continuous polling of specific SNMP OID
A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged attacker to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causing a Denial of Service to the FPC resources. When the FPC runs out of the GUID space, you will see the following syslog messages. The evo-aftmand-bt process is asserting. fpc1 evo-aftmand-bt[17556]: %USER-3: get_next_guid: Ran out of Guid Space start 1748051689472 end 1752346656767 fpc1 audit[17556]: %AUTH-5: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17556 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=6 fpc1 kernel: %KERN-5: audit: type=1701 audit(1648567505.119:57): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17556 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=6 fpc1 emfd-fpa[14438]: %USER-5: Alarm set: APP color=red, class=CHASSIS, reason=Application evo-aftmand-bt fail on node Fpc1 fpc1 emfd-fpa[14438]: %USER-3-EMF_FPA_ALARM_REP: RaiseAlarm: Alarm(Location: /Chassis[0]/Fpc[1] Module: sysman Object: evo-aftmand-bt:0 Error: 2) reported fpc1 sysepochman[12738]: %USER-5-SYSTEM_REBOOT_EVENT: Reboot [node] [ungraceful reboot] [evo-aftmand-bt exited] The FPC resources can be monitored using the following commands: user@router> start shell [vrf:none] user@router-re0:~$ cli -c "show platform application-info allocations app evo-aftmand-bt" | grep ^fpc | grep -v Route | grep -i -v Nexthop | awk '{total[$1] += $5} END { for (key in total) { print key " " total[key]/4294967296 }}' Once the FPCs become unreachable they must be manually restarted as they do not self-recover. This issue affects Juniper Networks Junos OS Evolved on PTX Series: All versions prior to 20.4R3-S4-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO version 21.2R1-EVO and later versions; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.
[ "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-wr2f-m2wv-m5j4
Huawei OceanStor SNS3096 V100R002C01 have an information disclosure vulnerability. Attackers with low privilege can exploit this vulnerability by performing some specific operations. Successful exploit of this vulnerability can cause some information disclosure.
[]
null
null
null
null
CVE-2023-0416
GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-6wpv-cj6x-v3jw
http vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
[]
null
5.9
null
null
GHSA-hxmp-jcqj-83hm
Magento 2 Community Edition Injection Vulnerability
An injection vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with marketing manipulation privileges can invoke methods that alter data of the underlying model followed by corresponding database modifications.
[]
null
null
6.5
null
RHSA-2021:1306
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.3
null
null
GHSA-qpjc-9f2w-grp8
Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field.
[]
null
null
null
null
CVE-2021-1366
Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
[ "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*" ]
null
7.8
null
null
CVE-2014-9764
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a crafted GIF file.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:enlightenment:imlib2:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2010-0278
A certain ActiveX control in msgsc.14.0.8089.726.dll in Microsoft Windows Live Messenger 2009 build 14.0.8089.726 on Windows Vista and Windows 7 allows remote attackers to cause a denial of service (msnmsgr.exe crash) by calling the ViewProfile method with a crafted argument during an MSN Messenger session.
[ "cpe:2.3:a:microsoft:windows_live_messenger:2009:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-5qc5-pr45-rv6r
The GridFTP in Globus Toolkit (GT) before 5.2.2, when certain autoconf macros are defined, does not properly check the return value from the getpwnam_r function, which might allow remote attackers to gain privileges by logging in with a user that does not exist, which causes GridFTP to run as the last user in the password file.
[]
null
null
null
null
CVE-2005-1916
linki.py in ekg 2005-06-05 and earlier allows local users to overwrite or create arbitrary files via a symlink attack on temporary files.
[ "cpe:2.3:a:ekg_project:ekg:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-p6m6-g28j-5g3h
A remote arbitrary command execution vulnerability was discovered in Aruba Operating System Software version(s): Prior to 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.16. Aruba has released patches for ArubaOS that address this security vulnerability.
[]
null
null
null
null
GHSA-735f-pg76-fxc4
openssl-src heap memory corruption with RSA private key operation
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
[]
null
9.8
null
null
GHSA-pqm6-cgwr-x6pf
Signature validation bypass in XmlSecLibs
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
[]
null
8.8
null
null
CVE-2004-1472
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 allow remote attackers to cause a denial of service (device freeze) via a fast UDP port scan on the WAN interface.
[ "cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:gateway_security:320:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:gateway_security:360:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:gateway_security:360r:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2021:0087
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
CVE-2016-1404
Cisco UCS Invicta 4.3, 4.5, and 5.0.1 on Invicta appliances and Invicta Scaling System uses the same hardcoded GnuPG encryption key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by sniffing network traffic to an Autosupport server and leveraging knowledge of this key from another installation, aka Bug ID CSCur85504.
[ "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.3_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.5_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:5.0_base:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2015-3854
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java in Android 5.x allows attackers to bypass a DEVICE_POWER permission requirement via a broadcast intent with the PNW.stopSaver action, aka internal bug 20918350.
[ "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2013-2116
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.
[ "cpe:2.3:a:gnu:gnutls:2.12.23:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-fjcf-3j3r-78rp
LiteLLM Has an Improper Authorization Vulnerability
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
[]
null
null
8.1
null
GHSA-q74v-986x-wjxj
Directory traversal vulnerability in include/reputation/rep_profile.php in the Reputation plugin 2.2.4, 2.2.3, 2.0.4, and earlier for PunBB, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the pun_user[language] parameter.
[]
null
null
null
null
CVE-2016-0440
Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect availability via vectors related to NFSv4.
[ "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-665c-9q2w-85pg
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a stack-based buffer over-read in WriteWEBPImage in coders/webp.c, related to a WEBP_DECODER_ABI_VERSION check.
[]
null
null
8.8
null
GHSA-9qgv-7wf9-26xp
The JM Twitter Cards plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 12 via the meta description data. This makes it possible for unauthenticated attackers to view password protected post content when viewing the page source.
[]
null
5.3
null
null
GHSA-5mmx-hq97-58f6
SQL injection vulnerability in gaozhifeng PHPMyWind v.5.6 allows a remote attacker to execute arbitrary code via the id variable in the modify function.
[]
null
7.2
null
null
RHSA-2009:1430
Red Hat Security Advisory: firefox security update
firefox: URL bar spoofing vulnerability Firefox 3.5 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 browser engine crashes Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5 3.0.14 JavaScript engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability Firefox 3.5.3 3.0.14 Location bar spoofing via tall line-height Unicode characters Firefox 3.5.3 3.0.14 Chrome privilege escalation with FeedWriter
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-xc72-g7rw-977p
The Custom Post Type List Shortcode WordPress plugin through 1.4.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
GHSA-4jjh-vjvp-6gvg
Improper buffer length validation in WLAN function can lead to a potential integer oveflow issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150
[]
null
null
7.8
null
GHSA-8vvg-hj6f-q4wj
An assertion-failure flaw was found in Qemu before 2.10.1, in the Network Block Device (NBD) server's initial connection negotiation, where the I/O coroutine was undefined. This could crash the qemu-nbd server if a client sent unexpected data during connection negotiation. A remote user or process could use this flaw to crash the qemu-nbd server resulting in denial of service.
[]
null
null
7.5
null
CVE-2024-10470
WPLMS Learning Management System for WordPress <= 4.962 - Unauthenticated Arbitrary File Read and Deletion
The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated.
[ "cpe:2.3:a:vibethemes:wordpress_learning_management_system_:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-pjf2-m942-xfgr
The Truemag theme 2016 Q2 for WordPress has XSS via the s parameter.
[]
null
null
null
null
GHSA-p6w9-gq3p-g5g4
The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
[]
null
null
7.5
null
GHSA-3pw6-qjj9-fvw4
SQL injection vulnerability in default.asp in VU Case Manager allows remote attackers to execute arbitrary SQL commands via the username parameter, a different vector than CVE-2007-6143. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-j95x-5hwj-wcc6
SQL injection vulnerability in the [Gobernalia] Front End News Submitter (gb_fenewssubmit) extension 0.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2021-3624
There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.
[ "cpe:2.3:a:dcraw_project:dcraw:9.28-2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
GHSA-hf6h-cv6q-2jpq
OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts.
[]
null
null
null
null
GHSA-ph35-xjxx-64r9
The RSA 1.5 algorithm implementation in the JOSE_JWE class in JWE.php in jose-php before 2.2.1 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
[]
null
5.3
null
null
CVE-2022-29682
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/vod/admin/topic/del.
[ "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
RHSA-2003:040
Red Hat Security Advisory: : Updated openldap packages available
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
GHSA-vh84-vf5v-vg64
The FTP server in AS/400 4.3, when running in IFS mode, allows remote attackers to obtain sensitive information via a symlink attack using RCMD and the ADDLNK utility, as demonstrated using the QSYS.LIB library.
[]
null
null
null
null
GHSA-9gcv-g5q9-f633
It has been discovered that redhat-certification does not properly limit the number of recursive definitions of entities in XML documents while parsing the status of a host. A remote attacker could use this vulnerability to consume all the memory of the server and cause a Denial of Service. This flaw affects redhat-certification version 7.
[]
null
7.5
null
null
CVE-2024-57548
CMSimple 5.16 allows the user to edit log.php file via print page.
[]
null
9.1
null
null