id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-w8jp-qw34-jrrq | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to upload arbitrary-sized files to specific folders on an affected device, which could lead to an unexpected device reload. The vulnerability exists because the affected software does not efficiently handle the writing of large files to specific folders on the local file system. An attacker could exploit this vulnerability by uploading files to those specific folders. A successful exploit could allow the attacker to write a file that triggers a watchdog timeout, which would cause the device to unexpectedly reload, causing a denial of service (DoS) condition. | [] | null | 8.6 | null | null |
|
CVE-2024-13752 | WP Project Manager <= 2.6.17 - Missing Authorization to Authenticated (Subscriber+) Limited Arbitrary Options Update | The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check in the '/pm/v2/settings/notice' endpoint all versions up to, and including, 2.6.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cause a persistent denial of service condition. | [] | null | 6.5 | null | null |
GHSA-57qv-hxpw-pjp9 | The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode | [] | null | 9.8 | null | null |
|
GHSA-q58r-wxw5-2g3g | GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22096. | [] | null | null | 7.8 | null |
|
CVE-2020-12355 | Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | [
"cpe:2.3:o:intel:trusted_execution_engine:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 |
|
CVE-2022-23299 | Windows PDEV Elevation of Privilege Vulnerability | Windows PDEV Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2010-0234 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Null Pointer Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
CVE-2016-7946 | X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields. | [
"cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2001-0583 | Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001. | [
"cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-mc36-m4g2-3jjf | SQL injection vulnerability in Triton CMS Pro allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header. | [] | null | null | null | null |
|
CVE-2025-2829 | Local Code Execution Vulnerability in Arena® | A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. | [] | 8.5 | null | null | null |
RHSA-2020:2906 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | 6.1 | null |
CVE-2024-54996 | MonicaHQ v4.1.2 was discovered to contain multiple authenticated Client-Side Injection vulnerabilities via the title and description parameters at /people/ID/reminders/create. | [] | null | 8.8 | null | null |
|
CVE-2009-1434 | Cross-site request forgery (CSRF) vulnerability in Foswiki before 1.0.5 allows remote attackers to hijack the authentication of arbitrary users for requests that modify pages, change permissions, or change group memberships, as demonstrated by a URL for a (1) save or (2) view script in the SRC attribute of an IMG element, a related issue to CVE-2009-1339. | [
"cpe:2.3:a:foswiki:foswiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foswiki:foswiki:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foswiki:foswiki:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:foswiki:foswiki:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:foswiki:foswiki:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2020:5234 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:4836 | Red Hat Security Advisory: RHACS 4.5 enhancement and security update | follow-redirects: Possible credential leak cosign: Malicious attachments can cause system-wide denial of service cosign: Malicious artifects can cause machine-wide denial of service | [
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 4.2 | null | null |
CVE-2024-23218 | A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-jv3w-8m4c-qjj2 | Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box." | [] | null | null | null | null |
|
CVE-2024-5857 | Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free <= 3.7.3.2 - Missing Authorization to Unauthenticated Arbitrary Media Deletion | The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the af2_handel_file_remove AJAX action in all versions up to, and including, 3.7.3.2. This makes it possible for unauthenticated attackers to delete arbitrary media files. | [
"cpe:2.3:a:funnelforms:funnelforms_free:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:funnelforms:funnelforms_free:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-frqh-x6r7-h6mq | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Reflected XSS in the search functionality. | [] | null | null | 6.1 | null |
GHSA-8qp2-79w8-8586 | GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability. | [] | null | 7.5 | null | null |
|
CVE-2014-5961 | The russiananime (aka com.rareartifact.russiananime68A5CCFE) application 1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:hdcar:russiananime:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-w97m-m9mq-rc37 | STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .mobi file, related to a "Read Access Violation starting at STDUMOBIFile!DllUnregisterServer+0x000000000002efc0." | [] | null | null | 7.8 | null |
|
CVE-2022-21607 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-c6h8-w2p9-jcrc | The Active Directory Integration plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 7.2 | null | null |
|
CVE-2017-18564 | The sender plugin before 1.2.1 for WordPress has multiple XSS issues. | [
"cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-0740 | Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. | [
"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-frhp-pv4w-xxj6 | In initiateVenueUrlAnqpQueryInternal of sta_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262245630 | [] | null | 4.4 | null | null |
|
CVE-2024-3445 | SourceCodester Laundry Management System laporan_filter sql injection | A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /karyawan/laporan_filter. The manipulation of the argument data_karyawan leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259702 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:laundry_management_system_project:laundry_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-j7jg-rhfm-99f8 | Missing Authorization vulnerability in NotFound WP Journal allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Journal: from n/a through 1.1. | [] | null | 6.5 | null | null |
|
GHSA-47pc-84xg-qf5p | NVIDIA Windows GPU Display driver software for Windows (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DeviceIoControl where the software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer, which may lead to denial of service. | [] | null | null | null | null |
|
GHSA-xhx8-9r5h-vm7p | Tenda TX9 Pro v22.03.02.10 was discovered to contain a stack overflow via the list parameter at /goform/SetIpMacBind. | [] | null | 7.5 | null | null |
|
GHSA-mhp7-xhx6-9x45 | Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732. | [] | null | 9.8 | null | null |
|
CVE-2021-28372 | ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device. | [
"cpe:2.3:a:throughtek:kalay_p2p_software_development_kit:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | 7.6 |
|
CVE-2021-33949 | An issue in FeMiner WMS v1.1 allows attackers to execute arbitrary code via the filename parameter and the exec function. | [
"cpe:2.3:a:wms_project:wms:1.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
cisco-sa-20180502-iosxr | Cisco IOS XR Software netconf Denial of Service Vulnerability | A vulnerability in the netconf interface of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on affected system.
The vulnerability is due to improper handling of malformed requests processed by the netconf process. An attacker could exploit this vulnerability by sending malicious requests to the affected software. An exploit could allow the attacker to cause the targeted process to restart, resulting in a DoS condition on the affected system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-iosxr ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-iosxr"] | [] | null | null | 5.3 | null |
RHSA-2018:2557 | Red Hat Security Advisory: postgresql security update | postgresql: Certain host connection parameters defeat client-side security defenses | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.5 | null |
GHSA-v67g-p3w9-wpqc | user_profile.asp in PortalApp 2.2 allows local users to gain privileges by modifying the user_id variable. | [] | null | null | null | null |
|
GHSA-fg8x-qfj7-cj7c | NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS. | [] | null | null | null | null |
|
RHSA-2013:0749 | Red Hat Security Advisory: apache-cxf security update | apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor apache-cxf: UsernameTokenPolicyValidator and UsernameTokenInterceptor allow empty passwords to authenticate | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.0"
] | null | null | null | null |
GHSA-6f22-g6xj-p8f6 | The Domino web agent in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, R12.5 before CR5, R12.51 before CR4, and R12.52 before SP1 CR3 allows remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request. | [] | null | null | 9.1 | null |
|
CVE-2024-2003 | Local Privilege Escalation in Quarantine of ESET products for Windows | Local privilege escalation vulnerability allowed an attacker to misuse ESET's file operations during a restore operation from quarantine. | [
"cpe:2.3:a:eset:safe_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*",
"cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*",
"cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*",
"cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*",
"cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:eset:smart_security:-:*:*:*:business:*:*:*",
"cpe:2.3:a:eset:security:-:*:*:*:ultimate:*:*:*",
"cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*",
"cpe:2.3:a:eset:nod32:-:-:*:*:*:*:*:*",
"cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
RHSA-2025:1824 | Red Hat Security Advisory: RHODF-4.17-RHEL-9 security update | PostCSS: Improper input validation in PostCSS node-gettext: Prototype Pollution golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html k8s.io/kubernetes: kubelet: node denial of service via kubelet checkpoint API | [
"cpe:/a:redhat:openshift_data_foundation:4.17::el9"
] | null | 6.2 | null | null |
GHSA-99h4-v6gx-v3qp | A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | 7.8 | null | null |
|
cisco-sa-sdwan-maapi-cmdinjec-znUYTuC | Cisco SD-WAN Software Command Injection Vulnerability | A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | null | 6.7 | null |
GHSA-q8wc-j5m9-27w3 | Denial of Service issue in quinn-proto | ImpactReceiving unknown QUIC frames in a QUIC packet could result in a panic.PatchesThe problem has been fixed in 0.9.5 and 0.10.5 maintenance releases.ReferencesFixed in https://github.com/quinn-rs/quinn/pull/1667, backported in https://github.com/quinn-rs/quinn/pull/1668 and https://github.com/quinn-rs/quinn/pull/1669. | [] | null | 7.5 | null | null |
CVE-2016-15029 | Ydalb mapicoin stats.php cross site scripting | A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The patch is identified as 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:mapicoin_project:mapicoin:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-23jg-h2c6-qxwq | The Tencent WBlog (com.tencent.WBlog) 3.3.1 and MicroBlogPad 1.4.0 applications for Android do not properly protect data, which allows remote attackers to read or modify message drafts and search keywords via a crafted application. | [] | null | null | null | null |
|
CVE-2013-3468 | The Cisco Unified IP Phone 8945 with software 9.3(2) allows remote attackers to cause a denial of service (device hang) via a malformed PNG file, aka Bug ID CSCud04270. | [
"cpe:2.3:h:cisco:unified_ip_phone_8945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware:9.3:\\(2\\):*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-8w84-ww36-m2xq | The unofficial ShellCheck extension before 0.13.4 for Visual Studio Code mishandles shellcheck.executablePath. | [] | null | 9.8 | null | null |
|
GHSA-f7g9-p35r-g9h9 | The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php. | [] | null | 9.8 | null | null |
|
CVE-2016-1249 | The DBD::mysql module before 4.039 for Perl, when using server-side prepared statement support, allows attackers to cause a denial of service (out-of-bounds read) via vectors involving an unaligned number of placeholders in WHERE condition and output fields in SELECT expression. | [
"cpe:2.3:a:dbd-mysql_project:dbd-mysql:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-mchx-7j67-8mcf | Casdoor CORS misconfiguration (GHSL-2024-035) | Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the logged in user. Due to the a logic error in checking only for a prefix when authenticating the Origin header, any domain can create a valid subdomain with a valid subdomain prefix (Ex: localhost.example.com), allowing the website to make requests to Casdoor as the current signed-in user. | [] | 8.6 | 8.1 | null | null |
GHSA-67x3-pf53-7724 | The Maps Plugin using Google Maps for WordPress WordPress plugin before 1.9.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.3 | null | null |
|
CVE-2019-6146 | It has been reported that cross-site scripting (XSS) is possible in Forcepoint Web Security, version 8.x, via host header injection. CVSSv3.0: 5.3 (Medium) (/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | [
"cpe:2.3:a:forcepoint:web_security:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2022-20028 | In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198663; Issue ID: ALPS06198663. | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-5jgp-wh79-75wg | An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file). | [] | null | 7.4 | null | null |
|
CVE-2018-1386 | IBM Tivoli Workload Automation for AIX (IBM Workload Scheduler 8.6, 9.1, 9.2, 9.3, and 9.4) contains directories with improper permissions that could allow a local user to with special access to gain root privileges. IBM X-Force ID: 138208. | [
"cpe:2.3:a:ibm:tivoli_workload_scheduler:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_workload_scheduler:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_workload_scheduler:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_workload_scheduler:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_workload_scheduler:9.4:*:*:*:*:*:*:*"
] | null | null | 7.4 | null |
|
RHBA-2014:1375 | Red Hat Bug Fix Advisory: sssd bug fix and enhancement update | sssd: incorrect expansion of group membership when encountering a non-POSIX group | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2021-36084 | The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper). | [
"cpe:2.3:o:selinux_project:selinux:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 |
|
CVE-2023-27395 | A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. | [
"cpe:2.3:a:softether_vpn:softether_vpn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
"cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
"cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*"
] | null | 9 | null | null |
|
CVE-2021-34084 | OS command injection vulnerability in Turistforeningen node-s3-uploader through 2.0.3 for Node.js allows attackers to execute arbitrary commands via the metadata() function. | [
"cpe:2.3:a:s3-uploader_project:s3-uploader:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2005-2432 | SQL injection vulnerability in PhpList allows remote attackers to modify SQL statements via the id argument to admin pages such as (1) members or (2) admin. | [
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2020:5179 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update | nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS nodejs-lodash: prototype pollution in zipObjectDeep function | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.4 | null | null |
CVE-2021-27216 | Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options. | [
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | 6.3 |
|
GHSA-q3x9-cqxj-2x38 | Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | 9.8 | null | null |
|
GHSA-cjmm-x9x9-m2w5 | Craft CMS stored XSS in review volume | SummaryXSS can be triggered by review volumesPoCRoot causeFunction: index.php?p=admin/actions/asset-indexes/process-indexing-session&v=1680710595770
After loading completed, progess will load:
"skippedEntries"
and
"missingEntries"
These parameters is not yet filtered, I just tried "skippedEntries" but I think it will be work with "missingEntries"My reponse:{
"session": {
"id": 10,
"indexedVolumes": {
"6": "\"<script>alert(1337)</script>"
},
"totalEntries": 2235,
"processedEntries": 2235,
"cacheRemoteImages": true,
"listEmptyFolders": false,
"isCli": false,
"actionRequired": true,
"dateCreated": "Apr 5, 2023, 9:03:16 AM",
"skippedEntries": [
"\"<script>alert(1337)</script>/assetpreviews/Image.php",
"\"<script>alert(1337)</script>/assetpreviews/Pdf.php"
],
"missingEntries": {
"folders": [],
"files": []
},
"processIfRootEmpty": false
},
"skipDialog": false
}Resolved in https://github.com/craftcms/cms/commit/053d7119697e480ff81c5723bb9a33eaa49e0fc7 | [] | null | 5.5 | null | null |
CVE-2017-0803 | A elevation of privilege vulnerability in the MediaTek accessory detector driver. Product: Android. Versions: Android kernel. Android ID: A-36136137. References: M-ALPS03361477. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2023-43821 | Delta Electronics Delta Industrial Automation DOPSoft DPS File wLogTitlesActionLen Buffer Overflow Remote Code Execution | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesActionLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
| [
"cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
RHSA-2020:2777 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.4 | null |
CVE-2005-1709 | Unknown vulnerability in Blue Coat Reporter before 7.1.2 allows remote unauthenticated attackers to add a license. | [
"cpe:2.3:a:bluecoat:reporter:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-6546 | Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2007-3268 | The TFTP implementation in IBM Tivoli Provisioning Manager for OS Deployment 5.1 before Fix Pack 3 allows remote attackers to cause a denial of service (rembo.exe crash and multiple service outage) via a read (RRQ) request with an invalid blksize (blocksize), which triggers a divide-by-zero error. | [
"cpe:2.3:a:ibm:tivoli_provisioning_manager_os_deployment:5.1.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-37862 | PHOENIX CONTACT: Missing Authorization in WP 6xxx Web panels | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-connections and might result in a partial denial-of-service. | [
"cpe:2.3:h:phoenixcontact:wp_6070-wvps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6101-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6121-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6156-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6185-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6215-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2015-9402 | The users-ultra plugin before 1.5.59 for WordPress has uultra-form-cvs-form-conf arbitrary file upload. | [
"cpe:2.3:a:usersultra:users_ultra_membership:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-wrqc-q8p5-76m5 | Incorrect Authorization in Jenkins Gerrit Trigger Plugin | An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information about Gerrit in Jenkins. | [] | null | null | 4.3 | null |
CVE-2006-5937 | Multiple integer overflows in Grisoft AVG Anti-Virus before 7.1.407 allow remote attackers to execute arbitrary code via crafted (1) CAB or (2) RAR archives that trigger a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:grisoft:avg_antivirus:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.0.251:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.0.323:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.1.308:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7xxv-8q2p-34g3 | A vulnerability, which was classified as critical, has been found in SourceCodester Engineers Online Portal 1.0. This issue affects some unknown processing of the file student_avatar.php. The manipulation of the argument change leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240905 was assigned to this vulnerability. | [] | null | null | 6.3 | null |
|
GHSA-f3p9-mw6f-g5p7 | Remote code execution in Pyrescom Termod4 time management devices before 10.04k allows authenticated remote attackers to arbitrary commands as root on the devices. | [] | null | null | null | null |
|
CVE-2023-47182 | WordPress Login Screen Manager Plugin <= 3.5.2 is vulnerable to Cross Site Scripting (XSS) | Cross-Site Request Forgery (CSRF) leading to a Stored Cross-Site Scripting (XSS) vulnerability in Nazmul Hossain Nihal Login Screen Manager plugin <= 3.5.2 versions. | [
"cpe:2.3:a:nazmulhossainnihal:login_screen_manager:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2012-3732 | Mail in Apple iOS before 6 uses an S/MIME message's From address as the displayed sender address, which allows remote attackers to spoof signed content via an e-mail message in which the From field does not match the signer's identity. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-h5jv-7mvc-m9hg | In ApexPro Telemetry Server, Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Telemetry Server Version 4.3, CARESCAPE Central Station (CSCS) Versions 1.X, a vulnerability exists in the affected products that could allow an attacker to obtain access to the SSH private key in configuration files. | [] | null | null | null | null |
|
RHSA-2009:1682 | Red Hat Security Advisory: kdegraphics security update | xpdf: buffer overflow in FoFiType1::parse | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2005-2523 | Multiple cross-site scripting (XSS) vulnerabilities in Weblog Server in Mac OS X 10.4 to 10.4.2 allow remote attackers to inject arbitrary web script or HTML via unknown vectors. | [
"cpe:2.3:a:apple:weblog_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-fqvv-c6v9-fvqv | An issue in the handling of symlinks was addressed with improved validation. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A malicious app with root privileges may be able to modify the contents of system files. | [] | null | 4.4 | null | null |
|
GHSA-gx3m-2wcq-p82x | SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an authenticated attacker to upload arbitrary files via unspecified vectors. If the file is PHP script, an attacker may execute arbitrary code. | [] | null | null | null | null |
|
GHSA-662h-8m8r-wfrp | An unauthenticated remote attacker may use the devices traffic capture without authentication to grab plaintext administrative credentials. | [] | null | 6.5 | null | null |
|
CVE-2006-5132 | Multiple PHP remote file inclusion vulnerabilities in phpMyAgenda 3.0 Final and earlier allow remote attackers to execute arbitrary PHP code via a URL in the rootagenda parameter to (1) agendaplace.php3, (2) agendaplace2.php3, (3) infoevent.php3, and (4) agenda2.php3, different vectors than CVE-2006-2009. | [
"cpe:2.3:a:phpmyagenda:phpmyagenda:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9vfp-qpv8-244p | Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511. | [] | null | null | null | null |
|
GHSA-m789-p7c6-4q2w | Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands. | [] | null | 7.8 | null | null |
|
GHSA-hg47-5j2j-pgvc | An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An attacker in a privileged network position may be able to perform denial of service attack using malformed Bluetooth packets. | [] | null | 7.5 | null | null |
|
CVE-2020-14691 | Vulnerability in the Oracle Financial Services Liquidity Risk Management product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.0.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Liquidity Risk Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Management accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). | [
"cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6.0.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-rxwr-r7r7-crrp | An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service. | [] | null | null | null | null |
|
GHSA-fxvg-3wj2-5pgh | Unspecified vulnerability in a Qualcomm component in Android before 2016-10-05 on Nexus 5X and 6P devices has unknown impact and attack vectors, aka internal bug 28823675. | [] | null | null | 9.8 | null |
|
GHSA-xfxc-48qf-j4g6 | Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original. | [] | null | 6.5 | null | null |
|
GHSA-jwph-qp5h-f9wj | Data races in bunch | An issue was discovered in the bunch crate through 2020-11-12 for Rust.
Affected versions of this crate unconditionally implements `Send`/`Sync` for `Bunch<T>`.
This allows users to insert `T: !Sync` to `Bunch<T>`. It is possible to create a data race to a `T: !Sync` by invoking the `Bunch::get()` API (which returns `&T`) from multiple threads. It is also possible to send `T: !Send` to other threads by inserting `T` inside `Bunch<T>` and sending `Bunch<T>` to another thread, allowing to create a data race by inserting types like `T = Rc<_>`.Such data races can lead to memory corruption. | [] | null | 8.1 | null | null |
CVE-2007-0602 | Buffer overflow in libvsapi.so in the VSAPI library in Trend Micro VirusWall 3.81 for Linux, as used by IScan.BASE/vscan, allows local users to gain privileges via a long command line argument, a different vulnerability than CVE-2005-0533. | [
"cpe:2.3:a:trend_micro:viruswall:3.81:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2005-2899 | Multiple cross-site scripting (XSS) vulnerabilities in details.php in CjTagBoard 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) date, (2) time, (3) name, (4) ip, (5) agent, or (6) msg parameter. | [
"cpe:2.3:a:cj_design:cj_tag_board:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2015-4626 | B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft. | [
"cpe:2.3:a:treasuryxpress:c2box:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2019-1122 | A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1121, CVE-2019-1123, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.